WO2006095895A1 - Data processing apparatus - Google Patents
Data processing apparatus Download PDFInfo
- Publication number
- WO2006095895A1 WO2006095895A1 PCT/JP2006/304836 JP2006304836W WO2006095895A1 WO 2006095895 A1 WO2006095895 A1 WO 2006095895A1 JP 2006304836 W JP2006304836 W JP 2006304836W WO 2006095895 A1 WO2006095895 A1 WO 2006095895A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- encrypted
- cut
- algorithm
- key
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present invention relates to a data processing apparatus capable of encrypting data to be processed in plain text and recording the encrypted data on a predetermined recording medium, and decrypting the encrypted data read from the recording medium, and Regarding application.
- data to be processed data that is not desirable to be disclosed to third parties (referred to in this specification as “data to be processed”) is recorded as a sign.
- data processing devices such as those described above that can be recorded on a medium is increasing.
- Various encryption technologies have been proposed and put into practical use to conceal the data to be processed, but it is difficult to completely prevent the decryption of the encryption.
- encryption of data to be processed and recording to a predetermined recording medium are performed by cutting the data to be processed into a predetermined number of bits and encrypting each piece of the cut data together. This is done by recording the digitized data on a predetermined recording medium.
- the data processing apparatus performs encryption or decryption processing in a fixed unit such as 8 bits or 16 bits.
- the present invention provides two communication devices that can encrypt processing object data that is plaintext and send it as encrypted data to the other communication device, and decrypt the received encrypted data into processing object data. It is an object to improve the data processing system that includes the third party to reduce the possibility of decryption of communication by a third party. Disclosure of the invention
- the data processing apparatus is as follows.
- the data processing device comprises means for encrypting data to be processed, which is plaintext, using a predetermined algorithm and a predetermined key to obtain encrypted data, a recording medium for recording the encoded data,
- a data processing apparatus comprising: means for decrypting encrypted data read from the recording medium using an algorithm and a key used to encrypt the encrypted data to obtain data to be processed.
- the data to be processed is cut into a plurality of plaintext cut data by cutting the data every predetermined number of bits, and the encrypted data is the same number of bits that was cut when the signature data was encrypted.
- a cutting means that cuts the data into a plurality of encrypted cut data every time, and the plaintext cut data is encrypted and encrypted by a key and an algorithm that changes at a predetermined timing.
- the encrypted data obtained by collecting the encrypted cut data encrypted by the encryption / decryption means is recorded on the recording medium, and the encrypted data recorded on the recording medium is recorded on the recording medium.
- connection means for interfacing the decrypted plaintext cut data into the processing target data, and encrypting the processing target data Used when reading / writing means for reading from the recording medium, connection means for interfacing the decrypted plaintext cut data into the processing target data, and encrypting the processing target data
- Specific information recording means for recording specific information for specifying the algorithm in association with the encrypted data on a predetermined recording medium, and the cutting means includes the processing.
- the target data, the with at least one of the plain text cut data is adapted to cut into different number of bits and the other plain text cut data, spoon-the encryption I
- the decrypting means reads the specific information associated with the encrypted data from the specific information recording means, and is specified based on the key and the specific information.
- a data processing device configured to perform the decoding by an algorithm.
- At least one of the plain text cut data has a bit number different from that of other plain text cut data.
- the encrypted data cannot be decrypted.
- at least one of the plaintext cut data and the encrypted cut data can have a different number of bits from the other plaintext cut data or the encrypted cut data. When trying to do so, it is necessary to use at least one plaintext cut data or encrypted cut data for processing in units other than 8 bits small or 16 bits, which are general data processing units. It becomes difficult to analyze on a general computer.
- the data processing apparatus changes the algorithm, but may change the key. This also achieves the same effect as the above case.
- the data is cut into a plurality of pieces of plaintext cut data, and the encrypted data is cut into the same number of bits that were cut when the encoded data was encrypted.
- the data cutting means and the plaintext cut data are converted into cipher cut data by using an algorithm and a key that changes at a predetermined timing.
- the encrypted cut data is decrypted into a plaintext cut data by decrypting the encrypted cut data with the key and algorithm used to encrypt the encrypted cut data, and the decrypting means, Reading the encrypted data recorded on the recording medium and reading the encrypted data recorded on the recording medium from the recording medium, the encrypted data obtained by collecting the encrypted cut data encrypted by the decryption means Connecting means for connecting the decrypted plaintext cut data to the processing target data, and specific information for specifying the key used when the processing target data is encrypted Specific information recording means for recording the data to be recorded on a predetermined recording medium in association with the encrypted data, wherein the cutting means converts the data to be processed into the plaintext cut data.
- At least one is cut so as to have a different bit number from the other plaintext cut data, and the decryption means is used to decrypt the encrypted cut data.
- Specific information associated with the encrypted data is read from the specific information recording means, and the decryption is performed with an algorithm and a key specified based on the specific information.
- An example is a device.
- the process target data which is plaintext is encrypted using a predetermined algorithm and a predetermined key to obtain encrypted data, the process of recording the encrypted data on a predetermined recording medium, and the read from the recording medium
- a data processing method that is executed by a data processing device that performs processing of decrypting encrypted data using the algorithm and key used to encrypt the encrypted data to obtain data to be processed. Therefore, the process in which the data processing device cuts the processing target data into a plurality of plaintext cut data by cutting each predetermined bit number, and an algorithm for changing the plaintext cut data with a key and a predetermined timing And the encrypted data obtained by combining the encrypted cut data is recorded on the recording medium.
- the process target data that is plaintext is encrypted using a predetermined algorithm and a predetermined key to be encrypted data, the process of recording the encrypted data on a predetermined recording medium, and the reading from the recording medium
- Data processing executed by a data processing apparatus that executes the process of decrypting the encrypted data using the algorithm and key used when encrypting the encrypted data to obtain the data to be processed A method in which the data processing device cuts the data to be processed into a plurality of plaintext cut data by cutting the data to be processed at a predetermined number of bits, and changes the plaintext cut data at an algorithm and at a predetermined timing.
- a process of encrypting the encrypted cut data by using a key to be encrypted and the encrypted data obtained by collecting the encrypted cut data are recorded on the recording medium.
- the specific information associated with the key data is read from the predetermined recording medium, and the decryption key is identified by the algorithm and the key specified based on the specific information. This is a data processing method.
- the data processing apparatus can be as follows. That is, means for encrypting processing target data in plain text using a predetermined algorithm and a predetermined key to obtain encrypted data, a recording medium for recording the encrypted data, and encrypted data read from the recording medium And a means for decrypting the encrypted data using the algorithm and key used to encrypt the encrypted data into processing target data, the processing target data for each predetermined number of bits.
- the encrypted data is cut into a plurality of plaintext cut data, and the encrypted data is cut into the same number of bits as when the encrypted data is encrypted.
- Cutting means for generating a solution a solution generating means for sequentially generating a pseudo-random solution, and the plaintext cutting data by a key and an algorithm generated based on the solution.
- the encrypted cut data is converted into encrypted cut data, and the encrypted cut data is decrypted by the key and algorithm used to sign the encrypted cut data and converted into plain text cut data.
- the encryption data / decryption means and the encrypted data obtained by collecting the encrypted cut data encrypted by the encryption / decryption means are recorded on the recording medium and recorded on the recording medium.
- Read / write means for reading the encrypted data from the recording medium, connection means for connecting the decrypted plaintext cut data to the processing target data, and used when the processing target data is encrypted.
- Specific information recording means for recording the specific information for specifying the algorithm in a predetermined recording medium in association with the encryption key data, and Is configured to cut the processing target data so that at least one of the plaintext cut data has a different number of bits from the other plaintext cut data
- the encryption / decryption means includes: When decrypting the encrypted cut data, the specific information associated with the encrypted data is read from the specific information recording means, and the key and the algorithm specified based on the specific information are used to determine the decryption key. It is a data processing device that is supposed to perform.
- the processing target data that is plaintext is used with a predetermined algorithm and a predetermined key.
- a data processing unit that decrypts the data to be processed using a predetermined algorithm and key, and cuts the data to be processed into a plurality of pieces of plaintext cut data by cutting the data to be processed every predetermined number of bits.
- a cutting means for cutting the encrypted data into a plurality of encrypted cutting data by cutting the encrypted data into the same number of bits that were cut when the encrypted data was encrypted.
- a solution generation means for sequentially generating a solution, and the plaintext cut data is encrypted with an algorithm and a key generated based on the solution to obtain encrypted cut data, and the encrypted cut data
- the encryption / decryption means for decrypting the encrypted data into the plaintext-cut data by using the key and the algorithm used to decrypt the encrypted data, and the encryption / decryption data
- Read / write means for recording encrypted data, which is a collection of encrypted cut data encrypted by the input means, on the recording medium, and reading the encrypted data recorded on the recording medium from the recording medium; Connection means for connecting the decrypted plaintext cut data to the processing target data, and specifying information for specifying the key used when the processing target data is encrypted
- Specific information recording means for recording on a predetermined recording medium in association with key data, and the cutting means includes the processing target data, wherein at least one of the plaintext cut data is The data is cut so that the number of bits differs from that of the other plaintext cut data, and the encryption / decryption means uses
- processing target data in plain text is used with a predetermined algorithm and a predetermined key.
- the process used to encrypt the encrypted data into the encrypted data, the process of recording the signature data on a predetermined recording medium, and the algorithm used to encrypt the encrypted data read from the recording medium And a data processing method executed by a data processing device that executes a process of decrypting using the key to obtain data to be processed, wherein the data processing device sequentially generates a pseudo-random solution.
- a process of cutting the data to be processed into a plurality of pieces of plaintext cut data by cutting the data to be processed by a predetermined number of bits, and an algorithm generated based on the key and the solution.
- a process of recording specific information for specifying the algorithm used when the data is recorded on a predetermined recording medium in association with the encrypted data, and a process of reading the encrypted data recorded on the recording medium from the recording medium Cutting the encrypted data into a plurality of encrypted cut data by cutting the encrypted data into the same number of bits that were cut when the encrypted data was encrypted, and the encrypted cut data
- the data processing device includes: processing the data into at least one of the plaintext cut data different from other plaintext cut data. When the encrypted cut data is decrypted, the specific information associated with the encrypted data is read from the predetermined recording medium, the key, And a data processing method for performing the decoding by an algorithm specified based on the specified information
- the process target data that is plaintext is encrypted using a predetermined algorithm and a predetermined key to form encrypted data, the process of recording the encrypted data on a predetermined recording medium, and the recording medium It is executed by a data processing device that executes the process of decrypting the encrypted data that has been read out using the algorithm and key used to encrypt the signature data and using the key to process the data.
- a step of recording a step of recording specific information for specifying the key used when the processing target data is encrypted, in association with the encryption data, on a predetermined recording medium, The process of reading the encrypted data recorded on the recording medium from the recording medium, and cutting the encrypted data by the same number of bits that was cut when the encrypted data was encrypted.
- the process of making a plurality of pieces of encrypted cut data, and the plaintext cut data by decrypting the encrypted cut data with the key and algorithm used to encrypt the encrypted cut data And the process of connecting the decrypted plaintext cut data to the processing target data, wherein the data processing device uses the processing target data as at least the plaintext cut data.
- One is cut so that the number of bits is different from that of the other plaintext cut data, and when decrypting the encrypted cut data, the specific information associated with the encrypted data is stored in the predetermined information. It is a data processing method that reads from a recording medium, performs the decryption with an algorithm, and a key specified based on the specific information.
- the data processing device includes all of the plaintext cut data by including dummy data that is not related to the processing target data except for the data having the largest number of bits among the plaintext cut data. If so this may be c comprise a mixing means for matching the number of bits of data to the number of bits of the plain text cut data sac Chi largest of bits as a unit of encryption or decryption by the data processing device Since the number of bits of the plaintext cut data or the encrypted cut data is the same, the encryption / decryption process is facilitated. On the other hand, since the third party does not know which data is the original plaintext cut data or encrypted cut data and which data is dummy data, the possibility of decryption is low. Until now.
- the data processing apparatus can be as follows. That is, means for encrypting processing target data in plain text using a predetermined algorithm and a predetermined key to obtain encrypted data, a recording medium for recording the encrypted data, and a read from the recording medium When encrypting encrypted data And a means for decrypting the data to be processed using the algorithm and key used for processing, and cutting the processing target data into a plurality of plaintext cut data by cutting the data to be processed every predetermined number of bits.
- Cutting means for cutting the encrypted data into a plurality of encrypted cut data by cutting the same encrypted data every bit number that is cut when the encrypted data is encrypted, and the plaintext cut data Is encrypted with a key and an algorithm that changes at a predetermined timing to be encrypted cut data, and the encrypted cut data is encrypted with the encrypted cut data. Decrypted by the extension algorithm into plaintext cut data, and the encryption or the decryption is performed for each reference number of bits. (I) Decryption means and encrypted data obtained by collecting the encrypted cut data encrypted by the encryption / decryption means are recorded on the recording medium and recorded on the recording medium.
- connecting means for connecting the decrypted plaintext cut data to the processing target data, and encrypting the processing target data
- Specific information recording means for recording specific information for specifying the algorithm in association with the encrypted data on a predetermined recording medium
- the cutting means includes the processing target data as the reference bit.
- the cutting means in this data processing apparatus cuts the data to be processed into a bit number shorter than the reference bit number.
- This reference bit number is, for example, 8 bits equal to a general data processing unit. Can be a bit.
- processing in a processing unit different from the general data processing unit of 8 bits or 6 bits is at least one plaintext cut data or encrypted cut. Since it is necessary for the data, it is difficult to perform analysis on a general computer. It will be a thing.
- the data processing apparatus includes a mixing unit that includes dummy data that is not related to the processing target data in the plain text cut data to match the plain text cut data with the reference bit number. .
- this data processing device can perform encryption / decryption processing in units of processing performed by a general computer, so that the hardware configuration remains unchanged from the conventional one. I'm sorry.
- the third party since the third party does not know which data is the original plaintext cut data or encrypted cut data, and which data is dirty data, the possibility of decryption is low. There is.
- the data is cut into a plurality of pieces of plaintext cut data, and the encrypted data is cut into the same number of bits as the encrypted data is cut when the encrypted data is encrypted.
- the cipher cut data is decrypted by the key used when encrypting the cipher cut data and an algorithm to obtain plain text cut data.
- Cryptographic / decrypting means that performs the encryption or decryption for each bit number, and an encryption that combines the encrypted cut data encrypted by the cryptographic / decrypting means.
- the recording medium connecting the read / write means for reading the encrypted data recorded on the recording medium from the recording medium, and the decrypted plaintext cut data to the processing target data
- Information recording means, and the cutting means includes the processing target data as the base data.
- the plaintext cut data includes dummy data unrelated to the processing target data, thereby reducing the number of bits of the plaintext cut data.
- the encryption unit includes a mixing unit configured to match the reference bit number, and the encryption / decryption unit identifies the specific information associated with the encrypted data when the encrypted cut data is decrypted.
- An example is a data processing device that reads from an information recording means and performs the decryption using an algorithm and a key specified based on the specific information.
- a process of encrypting data to be processed in plain text using a predetermined algorithm and a predetermined key to obtain encrypted data a process of recording the encrypted data on a predetermined recording medium, and reading from the recording medium
- Data processing method executed by a data processing apparatus for executing the process of decrypting the encrypted data using the algorithm and key used when encrypting the encrypted data into the processing target data The data processing device cuts the data to be processed into a plurality of plaintext cut data by a predetermined number of bits, and converts the plaintext cut data into a key and a predetermined timing.
- the process of encrypting encrypted reference data by the number of reference bits which is based on an algorithm that changes in accordance with the above, A process of recording on a recording medium, a process of recording specific information for specifying the algorithm used when encrypting the processing target data on a predetermined recording medium in association with the encrypted data, The process of reading the encrypted data recorded on the recording medium from the recording medium, and cutting the encrypted data by the same number of bits as that when the encrypted data was deleted.
- a plurality of encrypted cut data, and the encrypted cut data is decrypted for each reference bit number by the key and algorithm used when encrypting the encrypted cut data, and the plaintext cut data And the process of connecting the decrypted plaintext cut data to the processing target data, and the data processing device includes the processing pair The data, along with which such One to cut into short bits than the number of reference bits, the plain text cut data, not related to the subject data By including dummy data, the number of bits of the plaintext cut data is matched with the reference bit number, and when decrypting the encrypted cut data, the specific information associated with the encrypted data is A data processing method that reads from the predetermined recording medium, and performs the decryption by an algorithm specified based on a key and its specific information.
- the process target data that is plaintext is encrypted using a predetermined algorithm and a predetermined key to obtain encrypted data, the process of recording the encrypted data on a predetermined recording medium, and reading from the recording medium
- a data processing method executed by a data processing apparatus that executes the process of decrypting the encrypted data using the algorithm and key used to encrypt the encrypted data into the processing target data.
- the data processing device cuts the data to be processed into a plurality of plaintext cut data by cutting the data to be processed into a plurality of plaintext cut data, and the plaintext cut data by an algorithm and a key that changes at a predetermined timing.
- the process of encrypting the encrypted reference data for each reference bit number to obtain the encrypted cut data, and the encrypted data including the encrypted cut data, A process of recording on the recording medium, a process of recording specific information for specifying the key used when the processing target data is encrypted in association with the encryption data, and recording on a predetermined recording medium; The process of reading the encrypted data recorded on the recording medium from the recording medium, and the code identifier for each bit number that is disconnected when the encrypted data is encrypted.
- the process of cutting into a plurality of encrypted cut data, and decrypting the encrypted cut data for each reference bit number by the key and algorithm used when encrypting the encrypted cut data The plaintext cut data and connecting the decrypted plaintext cut data to the processing target data, and the data processing device includes the processing pair.
- the data is cut into a number of bits shorter than the reference number of bits, and the plaintext cut data includes dummy data that is not related to the processing target data.
- the specific information associated with the encrypted data is read from the predetermined recording medium, the algorithm, and the specific information A data processing method for performing the decryption with the specified key based on is there.
- the data processing apparatus of the second invention can be as follows.
- the data is cut into a plurality of pieces of plaintext cut data, and the encrypted data is cut into the same number of bits as the encrypted data is cut when the encrypted data is encrypted.
- the encrypted cut data is converted into encrypted cut data, and the encrypted cut data is decrypted by the key and algorithm used to sign the encrypted cut data and converted into plain text cut data.
- encryption / decryption means for performing encryption or decryption for each reference bit number serving as a reference, and encryption encrypted by the encryption / decryption means
- the encrypted data in which the encrypted cut data is collected is recorded on the recording medium, and the read / write means for reading the encrypted data recorded on the recording medium from the recording medium; and the decrypted plaintext Connection means for connecting cut data to the processing target data, and specific information for specifying the algorithm used when the processing target data is encrypted are included in the encoding data.
- Specific information recording means for recording on a predetermined recording medium in association with the data, and by including dummy data unrelated to the processing target data in the plaintext cut data, the number of bits of the plaintext cut data is set to the reference bit Mixing means for matching the number, and the cutting means cuts the data to be processed into a number of bits shorter than the reference number of bits.
- the encoding means when decrypting the encrypted cut data, reads the specific information associated with the encrypted data from the specific information recording means, and identifies the key and the algorithm specified based on the specific information
- the data processing apparatus is adapted to perform the decryption.
- the ciphers are cut into bit-by-bit numbers to obtain a plurality of plaintext cut data.
- the encrypted cut data to be encrypted cut data, and the encrypted cut data is decrypted by the key and algorithm used for encrypting the encrypted cut data to obtain plain text cut data
- encryption / decryption means for performing encryption or decryption for each reference number of reference bits, and encryption encrypted by the encryption / decryption means.
- the encrypted data including the cut data is recorded on the recording medium, the read / write means for reading the encrypted data recorded on the recording medium from the recording medium, and the decrypted plaintext cut data Connection means for connecting to the processing target data, and specifying information for specifying the key used when the processing target data is entered as the encrypted data
- Specific information recording means for recording on a predetermined recording medium in association with each other, and by including dummy data unrelated to the processing target data in the plaintext cut data, the number of bits of the plaintext cut data is set to the reference bit Mixing means for matching the number, and the cutting means cuts the data to be processed into a bit number shorter than the reference bit number, and the encryption / decryption means
- the specific information associated with the encrypted data is read from the specific information recording means, and the decryption is performed with the algorithm and the key specified based on the specific information.
- This is a data processing device that is designed to perform data conversion.
- the process target data which is plaintext is encrypted using a predetermined algorithm and a predetermined key to obtain encrypted data
- the process of recording the encrypted data on a predetermined recording medium is encrypted using a predetermined algorithm and a predetermined key to obtain encrypted data
- the process of recording the encrypted data on a predetermined recording medium is read from the recording medium
- the data processing device sequentially generates a pseudo-random solution, cuts the processing target data into a plurality of plaintext cut data for each predetermined number of bits, and converts the plaintext cut data to A process of encrypting each key number of reference bits by the algorithm generated based on the key, the key, and the solution to obtain the cipher cut data;
- the process of matching the number of bits of the plaintext cut data with the reference bit number by including dummy data not related to the processing target data in the plaintext cut data, and the encrypted cut data A process of recording the signal data on the recording medium, and a specific recording for associating specific information for specifying the algorithm used when the data to be processed is signed with the encrypted data
- a process of recording on the medium, a process of reading out the encrypted data recorded on the recording medium from the recording medium, and the same bit that was cut when the encrypted data was encrypted A process of cutting every number into a plurality of cipher cut data, and a key used for encrypting the cipher cut data with the cipher
- the processing device cuts the data to be processed into a bit number shorter than the reference bit number so that at least one of the plaintext cut data has a different bit number from other plaintext cut data.
- the specific information associated with the encrypted data is read from the predetermined recording medium, and is specified based on the key and the specific information.
- a data processing method that performs the decoding by an algorithm corresponds to this.
- processing data that is plaintext is processed using a predetermined algorithm and a predetermined key. Used to encrypt the encrypted data into the encrypted data, record the encrypted data on a predetermined recording medium, and encrypt the encrypted data read from the recording medium.
- a data processing method executed by a data processing apparatus that executes a process of decrypting using an algorithm and a key to obtain data to be processed, wherein the data processing apparatus sequentially generates a pseudo-random solution
- the process of encrypting each reference bit number into encrypted cut data, and including the dummy data unrelated to the processing target data in the plain text cut data A process of matching the number of bits of the plaintext cut data with the reference bit number, a process of recording encrypted data including the encrypted cut data on the recording medium, and encrypting the processing target data
- a process of recording specific information for specifying the key used at the time in association with the encrypted data on a predetermined recording medium, and a process of reading the encrypted data recorded on the recording medium from the recording medium Cutting the encrypted data into a plurality of encrypted cut data by cutting the encrypted data into the same number of bits that were cut when the encrypted data was signed, and
- the algorithm used when encrypting the encrypted cut data, and the process of decrypting it into plaintext cut data for each reference bit number by the key, and the decrypted data And connecting the plaintext cut data to the processing target data, and the data processing device converts the processing target data into at least one of the plaintext cut data and other plaintext cut data.
- the number of bits is different so that the number of bits is shorter than the reference number of bits, and when the encrypted cut data is decrypted, the identification associated with the encrypted data is specified.
- the data processing method includes reading information from the predetermined recording medium, and performing the decryption using an algorithm and a key specified based on the specific information.
- the cutting means in the data processing device of the second invention may cut the processing target data into a fixed number of bits as long as the processing target data is cut shorter than the reference bit number.
- the bit may be cut to a different number of bits. The former is easier to process, but in the latter case the cipher is decrypted. Less likely to be read.
- the mixing means includes the dummy data in a specific position of the plaintext cut data.
- the dummy data may be included in a predetermined position that is different for each plaintext cut data. The former is easier to process, but the latter is less likely to be decrypted.
- the solution generation means in the second invention may generate the solution each time the processing target data is encrypted or the encrypted data is decrypted, or the plaintext cut data
- the solution may be generated each time encryption or decryption of the encrypted cut data is performed.
- the mixing means in the second invention may be configured to determine the predetermined position including the dummy data based on the solution, or the second invention
- the cutting means in may cut the processing target data based on the solution so that at least one of the plaintext cut data of the preceding word has a different number of bits from the other plaintext cut data.
- the third invention is as follows.
- a third aspect of the invention there is provided means for encrypting processing target data, which is plaintext, using a predetermined algorithm and a predetermined key to obtain encrypted data, a recording medium for recording the encrypted data, and reading from the recording medium And the means used to decrypt the encrypted data into the processing target data by using the algorithm and the key used to convert the encrypted data into the processing target data.
- a solution generating means for generating a new solution By substituting the past solution into a predetermined solution generation algorithm that can generate a new solution by substituting at least one of the past solutions, and a cutting means to make a plurality of encrypted cut data, Each time the data to be processed is encrypted, it is updated sequentially.
- a solution generating means for generating a new solution a first algorithm generating means for sequentially generating a new algorithm each time the data to be processed is encoded using the generated solution, and a generated solution.
- second algorithm generating means for sequentially generating the same new algorithm as that generated by the first algorithm generating means, the plaintext cut data, the key, and the first 1 is encrypted by the algorithm generated by the algorithm generating means to be encrypted cut data, and the encrypted cut data is used to encrypt the encrypted cut data, and
- the encrypted data generated by the second algorithm generating means is decrypted by the same algorithm used when encrypting the encrypted data.
- Encrypted data that is a combination of the encryption key / decryption means to be sentence-cut data and the sign-sign cut data that has been signed by the sign-decryption means is stored in the recording medium.
- Reading and writing means for reading encrypted data recorded on the recording medium from the recording medium, and connecting means for connecting the decrypted plaintext cut data to the processing target data.
- the cutting means is a data processing device configured to cut the processing target data so that at least one of the plaintext cut data has a different number of bits from other plaintext cut data. .
- a data processing apparatus configured to decrypt a plurality of the encrypted data in the same order as the encrypted data, and the processing target data for each predetermined number of bits. And the encrypted data is cut into the same number of bits as that when the encrypted data is encrypted.
- the processing means by substituting the past solution into a predetermined solution generation algorithm capable of generating a new solution by substituting at least one of the past solutions, and cutting means for converting the encrypted cut data into a number Solution generating means for sequentially generating a new solution each time the target data is encrypted, and a sign of the processing target data using the generated solution
- First key generation means for sequentially generating a new key each time, and the first key generation means is sequentially generated each time the key signature is decrypted using the generated solution.
- Second key generation means for generating the same new key as above, and the plaintext cut data is encrypted with the algorithm and the key generated by the first key generation means to obtain encrypted cut data And an algorithm used when encrypting the encrypted cut data and encrypting the encrypted data generated by the second key generation means.
- the encryption key / decryption means for decrypting the plaintext data with the same key as the received data and the encrypted cut data encrypted by the encryption / decryption means are collected.
- the encrypted data is stored in the recording medium.
- Reading and writing means for reading out the encrypted data recorded on the recording medium from the recording medium, and connecting means for connecting the decrypted plaintext cut data to the processing target data
- the cutting means is a data processing device configured to cut the processing target data so that at least one of the plaintext cut data has a different number of bits from other plaintext cut data.
- the data processing device of the third invention is similar to the data processing device of the first invention, but unlike the data processing device of the first invention, specifies the algorithm or key used when encrypting the data to be processed. Therefore, the specific information is not used. This is because the data processing device according to the third aspect of the invention encodes a plurality of data to be processed into encrypted data, and decrypts the plurality of encrypted data in the same order as they are encrypted.
- Each of the algorithm generation means and the key generation means in the data processing device according to the third aspect of the invention generates an algorithm or a key each time the data to be processed is encrypted.
- the data processing device according to the third aspect of the invention generates the same algorithm and key as used when performing the encryption when performing the decryption.
- the same algorithm or key as the algorithm or key generated in the past is sequentially generated, so that a plurality of the encrypted data are encrypted.
- the decryption is performed in the same order as described above, it is not necessary to use the specific information as described above.
- the effects exhibited by the third invention described above can also be obtained, for example, by the following method.
- a process for encrypting data to be processed in plain text using a predetermined algorithm and a predetermined key to obtain encrypted data a process for recording the signature data on a predetermined recording medium, and from the recording medium
- a data processing method executed by a data processing apparatus that executes the process of decrypting read encrypted data using the algorithm and key used to encrypt the encrypted data to make the data to be processed
- the data processing device cuts the processing target data into a plurality of plaintext cut data by cutting the data to be processed every predetermined number of bits, and substitutes at least one of the past solutions to obtain a new solution. By substituting a past solution into a predetermined solution generation algorithm that can be generated, a new solution is sequentially generated each time the data to be processed is encrypted.
- a first algorithm generation process for generating a new algorithm each time the processing target data is encrypted using the generated solution, and the plaintext cut data are a key
- the first (1) A process of encrypting encrypted data by an algorithm generated by an algorithm generation process to obtain encrypted cut data, a process of recording encrypted data including the encrypted cut data on the recording medium, and recording on the recording medium The process of reading out the encrypted data from the recording medium, and the same new one that is sequentially generated in the first algorithm generation process each time the encrypted data is decrypted using the generated solution.
- the process of decrypting the encrypted data into the plaintext cut data by using the same algorithm as that used for encrypting the encrypted data, and connecting the decrypted plaintext cut data to the processing target The data processing device encrypts a plurality of data to be processed into encrypted data, and the plurality of encrypted data are in the same order as they are encrypted.
- the data to be processed is cut and the data to be processed is cut so that at least one of the plaintext cut data has a bit number different from that of the other plaintext cut data. It is a processing method.
- a process of processing plaintext data to be encrypted using a predetermined algorithm and a predetermined key to form encrypted data a process of recording the encrypted data on a predetermined recording medium, and Data processing executed by a data processing device that executes the process of decrypting the encrypted data that has been read out using the algorithm and key used to encrypt the encrypted data to make the data to be processed
- a first key generation process that sequentially generates a new key each time the processing target data is encrypted using the generated solution, and the plaintext cut data is converted into an algorithm and the first key. Encrypting with the key generated by the generating process to obtain encrypted cut data, recording the encrypted data including the encrypted cut data on the recording medium, and the recording medium The process of reading the encrypted data recorded on the recording medium from the recording medium and the first key generation process sequentially every time the encryption data is decrypted by using the generated solution.
- the process of making encrypted cut data of The algorithm used to encrypt the encrypted cut data and the algorithm used when encrypting the encrypted cut data, and the encryption data generated by the second key generation process A process of decrypting the plaintext with the same key into plaintext cut data, and a process of connecting the decrypted plaintext cut data into the processing target data.
- a plurality of data to be processed are encrypted to be encrypted data, a plurality of the encrypted data are decrypted in the same order as they are encrypted, and the processing target data is A data processing method for cutting so that at least one of the plaintext cut data has a bit number different from that of other plaintext cut data.
- the third invention can be as follows. For example, means for encrypting processing target data in plain text using a predetermined algorithm and a predetermined key to obtain encrypted data, a recording medium for recording the encrypted data, and encrypted data read from the recording medium And a means for decrypting the encrypted data using the algorithm and key used to encrypt the encrypted data to make the data to be processed.
- the data processing apparatus is configured to decrypt a plurality of the encrypted data in the same order as they are signed, and to process the processing target data every predetermined number of bits. Into the plaintext cut data, and the encrypted data is cut into the same number of bits as when the encrypted data was encrypted.
- the above processing is performed by substituting the past solution into a predetermined solution generation algorithm that can generate a new solution by substituting at least one of the past solutions, and a cutting means for converting the encrypted cut data into a number.
- a first solution generation unit that sequentially generates a new solution each time the target data is encrypted, and sequentially every time the target data is encrypted using the solution generated by the first solution generation unit.
- a second solution generating unit that sequentially generates a new solution that is generated by the first solution generating unit, and a solution generated by the second solution generating unit.
- Second algorithm generating means for generating the same new algorithm as that generated by the first algorithm generating means each time the encrypted data is decrypted, and the plaintext cut data is used as a key.
- the data to be processed in plain text is encrypted using a predetermined algorithm and a predetermined key to obtain encrypted data, a recording medium for recording the encrypted data, and encrypted data read from the recording medium.
- a data processing apparatus configured to decrypt a plurality of the encrypted data in the same order as they are encrypted, and Are cut into a plurality of plaintext cut data, and the encrypted data is cut into the same number of bits that were cut when the encrypted data was encrypted.
- a first solution generation unit that sequentially generates a new solution every time the processing target data is encrypted, and every time the processing target data is encrypted using the solution generated by the first solution generation unit
- first key generation means for sequentially generating new keys
- Second key generation means for generating the same new key as that generated by the first key generation means each time data is decrypted, and the plaintext cut data is converted into an algorithm and the first key.
- a read / write means for reading the encrypted data recorded on the recording medium from the recording medium, and a connection means for connecting the decrypted plaintext cut data to the processing target data.
- the cutting means is a data processing device configured to cut the processing target data so that at least one of the plaintext cut data has a different bit number from other plaintext cut data. is there.
- These data processing devices differ from the two data processing devices shown above in that the solution generation means is the first algorithm generation means, the second algorithm generation means, or the first key generation means and the second key generation means, respectively. There are two points corresponding to. Even in this case, the same effect as the two data processing devices shown above can be obtained.
- the effects of the two most recent data processing devices can be obtained by, for example, the following two data processing methods.
- a solution generation process a first algorithm generation process that sequentially generates a new algorithm each time the data to be processed is encrypted using the solution generated in the first solution generation process, and the plaintext
- the encrypted data generated by the second algorithm generation process is encrypted.
- the process of decrypting the data into plaintext cut data by the same algorithm used at that time and connecting the decrypted plaintext cut data into the processing target data The data processing device encrypts a plurality of processing sealed data into encrypted data and decrypts the plurality of encrypted data in the same order as they are encrypted.
- a process of encrypting processing target data that is plaintext using a predetermined algorithm and a predetermined key to form encrypted data a process of recording the encrypted data on a predetermined recording medium, and the recording medium It is executed by a data processing device that executes the process of decrypting the encrypted data read from the encrypted data using the algorithm and key used for encrypting the encrypted data to make the data to be processed.
- the data processing unit 3 substitutes at least one of a process of cutting the processing target data into a plurality of plaintext cut data by cutting the data to be processed every predetermined number of bits.
- the new solution is sequentially added each time the data to be processed is encrypted.
- a first solution generation process a first key generation process for sequentially generating a new key each time the processing target data is encrypted using the solution generated in the first solution generation process,
- the plaintext cut data is encrypted with the algorithm and the key generated by the first key generation process to be encrypted cut data, and the encrypted data obtained by collecting the encrypted cut data is the recording medium.
- a process of reading the encrypted data recorded on the recording medium from the recording medium, and less past solutions By substituting the past solution into a predetermined solution generation algorithm that can generate a new solution by substituting one, the first solution is sequentially applied each time the encrypted data is decrypted.
- the encrypted encryption Decrypting with plaintext cut data using the same key as that used for decoding, connecting the decrypted plaintext cut data to the processing target data,
- the data processing apparatus encrypts a plurality of pieces of processing target data into encrypted data, decrypts the plurality of encrypted data in the same order as they are encrypted, and A data processing method for cutting target data so that at least one of the plaintext cut data has a bit number different from that of other plaintext cut data.
- the fourth invention is as follows.
- a data processing device configured to decrypt the plurality of encrypted data in the same order as they are signed, and cuts the processing target data every predetermined number of bits.
- a plurality of plaintext cut data, and the encrypted data is cut into a plurality of ciphers by cutting the encrypted data every same number of bits as when the encrypted data was encrypted.
- the encrypted data is converted into plaintext cut data, and the encryption or decryption means is configured to perform the encryption or the decryption for each reference bit number as a reference, and the encryption Reading data in which the encrypted data in which the encrypted cut data encrypted by the decrypting means are collected is recorded on the recording medium, and the encrypted data recorded on the recording medium is read from the recording medium And connecting means for connecting the decrypted plaintext cut data to the processing target data, wherein the cutting means sets the processing target data to be shorter than the reference bit number.
- the plaintext cut data includes dummy data that is not related to the processing target data, so that the number of bits of the plaintext cut data is set to the reference bit.
- a mixing means for matching the betting amount which is a data processing apparatus.
- a data processing apparatus configured to decrypt a plurality of the encrypted data in the same order as they are signed, and to process the data to be processed in a predetermined manner The data is cut for each bit number to obtain a plurality of plaintext cut data, and the encrypted data is cut for each bit number that was cut when the encrypted data was encrypted.
- a solution generation means for sequentially generating a new solution each time the processing target data is encrypted by substituting the past solution into a predetermined solution generation algorithm capable of generating a new solution
- First key generation means for sequentially generating a new key each time the processing target data is signed using the generated solution, and using the generated solution to decrypt the encrypted data.
- Second key generation means for generating the same new key as that generated by the first key generation means each time it is performed, and the plaintext cut data is generated by the algorithm and the first key generation means
- the encrypted key is encrypted with the encrypted key to obtain the encrypted cut data, the algorithm used when the encrypted cut data is encrypted, and the second key generation means.
- the encrypted data is decrypted with the same key as that used to encrypt the data to obtain plain text cut data, and the encryption or decryption is performed for each reference number of bits.
- the encryption / decryption means adapted to perform the encryption and the encryption key data obtained by collecting the encrypted cut data obtained by the sign / decryption means on the recording medium Recording and reading means for reading the encrypted data recorded on the recording medium from the recording medium, and connecting means for connecting the decrypted plaintext cut data to the processing target data.
- the cutting means cuts the processing target data into a bit number shorter than the reference bit number, and the plaintext cutting data has a relationship with the processing target data. By including have dummy data, and a mixing means for matching the number of bits of the plain text cut data with the number of the reference bit, a data processing apparatus.
- a process of encrypting processing target data which is plain text, using a predetermined algorithm and a predetermined key to obtain encrypted data, a process of recording the encrypted data on a predetermined recording medium, and the recording medium
- a second algorithm generation process for generating the same new algorithm as that generated in step (b), and cutting the encrypted data by the same number of bits that was cut when the encrypted data was encrypted.
- Decrypting each plain bit number into plaintext cut data by the same algorithm used when encrypting, and decrypting the plaintext cut data The data processing device includes a step of connecting a plurality of pieces of data to be processed into encrypted data and converting the plurality of pieces of encrypted data into encrypted data. This is a data processing method in which the data to be processed is decoded in the same order in which they are received, and the data to be processed is cut into a number of bits shorter than the reference number of bits.
- the process target data that is plaintext is encrypted using a predetermined algorithm and a predetermined key to obtain encrypted data, the process of recording the encrypted data on a predetermined recording medium, and reading from the recording medium
- Data processing method executed by a data processing apparatus that executes a process of T-decrypting the data to be processed using the algorithm and key used when encrypting the encrypted data Because the data processing device cuts the processing target data every predetermined number of bits.
- the processing target By substituting the past solution into a predetermined solution generation algorithm that can generate a new solution by substituting at least one of the past solutions into a plurality of plaintext cut data, the processing target A process of sequentially generating a new solution each time data is encrypted, a first key generating process of sequentially generating a new key each time the processing target data is encrypted using the generated solution, The process of matching the number of bits of the plaintext cut data with a reference reference bit number by including dummy data unrelated to the processing target data in the plaintext cut data, and the plaintext cut data.
- a process of encrypting each of the reference bits with the key generated by the first key generation process to obtain encrypted cut data, and collecting the encrypted cut data A process of recording the encrypted data on the recording medium, a process of reading the encrypted data recorded on the recording medium from the recording medium, and a decryption of the encrypted data using the generated solution.
- Plaintext cutting A pre-data processing apparatus encrypts a plurality of data to be processed into encrypted data, and converts the plurality of encrypted data into a plurality of encrypted data. This is a data processing method in which they are decrypted in the same order as they are encrypted, and the data to be processed is cut into a bit number shorter than the reference bit number.
- These data processing devices according to the fourth invention are similar to the data processing device according to the second invention. The difference is that the data processing apparatus according to the fourth invention does not have the specific information recording means. The reason why the data processing apparatus according to the fourth invention does not have the specific information recording means is the same as the reason why the third invention does not have it.
- the fourth invention may also have two solution generation means as the third invention does. It is as follows.
- a data processing apparatus configured to decrypt a plurality of the encrypted data in the same order as they are encrypted, and cuts the processing target data every predetermined number of bits. And the encrypted data is cut at the same number of bits as that when the encrypted data is encrypted, and a plurality of encrypted data is cut.
- the processing target By substituting the past solution into a predetermined solution generation algorithm that can generate a new solution by substituting at least one of the past solutions and the cutting means to be converted into the cut data, the processing target A first solution generating means for sequentially generating a new solution each time data encryption is performed, and each time the data to be processed is encrypted using the solution generated by the first solution generating means.
- First algorithm generation means for sequentially generating new algorithms, and substitution of past solutions for a predetermined algorithm for generating a new solution by substituting at least one of the past solutions
- the second solution generating unit generates the same new solution as the first solution generating unit sequentially generates each time the encrypted data is decrypted
- the second solution generating unit Use the solution Second algorithm generation means for sequentially generating the same new algorithm as that generated by the first algorithm generation means each time the encrypted data is decrypted, and the plaintext cut data, the key, and The key used when encrypting the encrypted cut data by encrypting the encrypted cut data with the algorithm generated by the first algorithm generating means.
- the encrypted data generated by the second algorithm generating means are decrypted by the same algorithm as used to encrypt the plaintext cut data, and each reference bit number serving as a reference
- the encryption / decryption means adapted to perform the encryption or the decryption and the encryption / decryption means
- the encrypted data obtained by collecting the encrypted cut data encrypted in this way is recorded on the recording medium, and the encrypted data recorded on the recording medium is recorded on the recording medium.
- the plaintext cut data includes dummy data that is not related to the processing target data, thereby reducing the number of bits of the plaintext cut data.
- This is a data processing device provided with mixing means for matching the number of reference bits.
- means for encrypting data to be processed in plain text using a predetermined algorithm and a predetermined key to obtain encrypted data, a recording medium for recording the encrypted data, and encrypted data read from the recording medium Means for decrypting the encrypted data using the algorithm and key used to encrypt the encrypted data to make the data to be processed.
- the data processing apparatus is configured to decrypt a plurality of the encrypted data in the same order as they are encrypted, and cuts the processing target data every predetermined number of bits. A plurality of plaintext cut data, and the encrypted data is cut into a plurality of bits by cutting the same encrypted data every bit number that was cut when the encrypted data was encrypted.
- the processing target data By substituting the past solution into a predetermined solution generation algorithm that can generate a new solution by substituting at least one of the past solutions, and the cutting means to be encrypted cut data, the processing target data
- a first solution generation unit that sequentially generates a new solution each time encryption is performed, and a new solution that is sequentially generated each time the data to be processed is encrypted using the solution generated by the first solution generation unit.
- the second solution generating means for generating the same new solution as the first solution generating means and the solution generated by the second solution generating means are used each time the data is decoded.
- the above-mentioned encrypted data Second key generation means for generating the same new key as that generated by the first key generation means each time decryption is performed, the plaintext cut data is converted into an algorithm, and the first key generation Encrypted with the key generated by the means to obtain the encrypted cut data, and the algorithm used when the encrypted cut data is signed to the encrypted cut data, and the second Generated by key generation means
- the encrypted data is decrypted with the same key as that used to encrypt the encrypted data into plaintext cut data.
- Encrypted data obtained by collecting the encrypted 'decryption means for decryption and the encrypted cut data encrypted by the encryption / decryption means is stored in the recording medium.
- Reading and writing means for reading encrypted data recorded on the recording medium from the recording medium, and connecting means for connecting the decrypted plaintext cut data to the processing target data.
- the cutting means cuts the processing target data into a bit number shorter than the reference bit number, and the plaintext cut data has no relation to the processing target data.
- a mixing means for matching the number of bits of the plain text cut data with the number of the reference bit, a data processing apparatus.
- the same effect as the two most recent data processing devices can be obtained by the following method, for example. That is, a process of encrypting plaintext processing target data using a predetermined algorithm and a predetermined key to obtain encrypted data, a process of recording the encrypted data on a predetermined recording medium, and A data processing method executed by a data processing apparatus that executes the process of decrypting the read encrypted data using the algorithm and key used to encrypt the encrypted data to make the data to be processed.
- the data processing apparatus generates a new solution by substituting at least one of the past solutions and the process of cutting the processing target data into a plurality of plaintext cut data by cutting each of the predetermined number of bits.
- a new solution is sequentially generated each time the data to be processed is encrypted.
- a step of generating a solution a step of matching the number of bits of the plaintext cut data with a reference number of reference bits by including dummy data not related to the processing target data in the plaintext cut data,
- a first algorithm generation process that sequentially generates a new algorithm each time the processing target data is encrypted using the solution generated in the solution generation process, the plaintext cut data, the key, and the first algorithm.
- a process of encrypting each reference bit number by an algorithm generated by a program generation process to obtain encrypted cut data, a process of recording encrypted data in which the encrypted cut data is collected on the recording medium, ⁇ ⁇ ⁇ recorded on the recording medium A process of reading data from the recording medium, and substituting the past solution into a predetermined solution generation algorithm that can generate a new solution by substituting at least one of the past solutions.
- the second solution generation process for generating the same new solution as that generated in the first solution generation process each time the decoding is performed using the solution generated in the second solution generation process.
- a process of cutting into the plurality of encrypted cut data by cutting the same number of bits as when cut, and when encrypting the encrypted cut data with the encrypted cut data uses the same algorithm as that used when encrypting the key used and the encrypted data generated by the second algorithm generation process, the plaintext is cut for each reference bit number.
- a process of connecting the decrypted plaintext cut data to the processing target data wherein the data processing device encrypts a plurality of processing target data and encrypts the data.
- a plurality of the encrypted data are decrypted in the same order as they were encrypted, and the data to be processed is cut into a number of bits shorter than the reference number of bits. .
- the process target data which is plaintext
- the process of recording the encrypted data on a predetermined recording medium and reading from the recording medium
- Data processing executed by a data processing device that executes the process of decrypting the encrypted data using the algorithm and key used to encrypt the encrypted data and making the data to be processed A method in which the data processing device cuts the data to be processed into a plurality of plaintext cut data by cutting the data to be processed every predetermined number of bits, and assigns at least one of the past solutions to obtain a new solution. By substituting a past solution into a predetermined solution generation algorithm that can be generated, a new solution is sequentially generated each time the data to be processed is encrypted.
- a first solution generation step a first key generation step that sequentially generates a new key each time the data to be processed is encrypted using the solution generated in the first solution generation step, and the plaintext cut Include dummy data not related to the processing target data in the data
- a process of encrypting each bit number to obtain encrypted cut data, a process of recording encrypted data including the encrypted cut data on the recording medium, and encrypted data recorded on the recording medium By substituting the past solution into a predetermined solution generation algorithm that can generate a new solution by substituting at least one of the past solutions.
- the second solution generation process for generating the same new solution as that generated in the first solution generation process and the solution generated in the second solution generation process are used.
- a second key generation process for generating the same new key as that generated in the first key generation process each time the encrypted data is decrypted, and the encrypted data is converted into the encrypted data. Cutting the same number of bits as when it was cut into a plurality of encrypted cut data, and using the encrypted cut data when encrypting the encrypted cut data And a process of decrypting the encrypted data generated by the second key generation process into plaintext cut data by decrypting each reference bit number with the same key used for encrypting the encrypted data generated by the second key generation process.
- the data processing apparatus can be as follows.
- the encryption of the processing target data is obtained.
- a solution generation unit that sequentially generates a new solution each time it is performed, and a first algorithm generation unit that sequentially generates a new algorithm each time the processing target data is encrypted using the generated solution.
- the second algorithm generator that generates the same new algorithm as that generated by the first algorithm generation means each time the encrypted key data is decrypted using the obtained solution.
- the plaintext cut data is encrypted by a key and an algorithm generated by the first algorithm generating means to obtain encrypted cut data, and the encrypted cut data is converted to the encrypted cut data.
- the plaintext cut data is decrypted by the same algorithm used when encrypting the key used when encrypting the encrypted data and the encrypted data generated by the second algorithm generating means.
- encryption / decryption means for performing encryption or decryption for each reference number of reference bits, and encryption by means of the encryption / decryption means.
- the encrypted data obtained by collecting the encrypted cut data is recorded on the recording medium, and the encrypted data recorded on the recording medium is recorded on the recording medium.
- Reading / writing means for reading from the data, and connecting means for connecting the decrypted plaintext cut data to the processing target data, wherein the cutting means converts the processing target data into the processing target data.
- the plaintext cut data includes the processing target data. It is a data processing device comprising a mixing unit that includes dummy data that is not related to and matches the number of bits of the plaintext cut data with the number of reference bits.
- means for encrypting data to be processed in plain text using a predetermined algorithm and a predetermined key to obtain encrypted data, a recording medium for recording the encrypted data, and encrypted data read from the recording medium Means to decrypt the encrypted data using the algorithm and key used to encrypt the encrypted data and make it the processing target data And encrypting a plurality of data to be processed into encrypted data, and decrypting a plurality of the key data in the same order as they are encrypted.
- the data to be processed is cut into a plurality of pieces of plaintext cut data by cutting the data to be processed every predetermined number of bits, and the encrypted data is cut when the encrypted data is encrypted.
- the cutting means for cutting the same number of bits into multiple encrypted cut data, and a predetermined solution generation algorithm that can generate a new solution by substituting at least one of the past solutions
- a solution generating means for sequentially generating a new solution every time the processing target data is encrypted, and the encryption of the processing target data using the generated solution
- a first key generation unit that sequentially generates a new key each time the data is generated, and a first key generation unit that sequentially generates a decryption of the encrypted data using the generated solution.
- a second key generation means for generating the same new key; and the plaintext cut data is encrypted with an algorithm and a key generated by the first key generation means to obtain encrypted cut data.
- the algorithm used when encrypting the encrypted cut data is used for encrypting the encrypted cut data, and the sign data generated by the second key generating means is used for signing the data.
- the encrypted key is decrypted with the same key as the received data to obtain plain text cut data, and the encryption or decryption is performed for each reference bit number as a reference.
- Encoding means and the encryption key Read / write means for recording on the recording medium encrypted data in which the encrypted cut data encrypted by the decryption means is collected, and reading the encrypted data recorded on the recording medium from the recording medium And connection means for connecting the decrypted plaintext cut data to the processing target data, wherein the cutting means has the processing target data as at least one of the processing target data.
- the number of bits is different from that of the other processing target data, so that the number of bits is shorter than the reference number of bits, and the plaintext cut data includes the processing target data.
- the data processing apparatus includes a mixing unit that includes dummy data having no relation to match the number of bits of the plaintext cut data with the reference number of bits.
- the effects of the two most recent data processing devices can also be obtained, for example, by the following method. That is, a process of encrypting plaintext processing target data using a predetermined algorithm and a predetermined key to obtain encrypted data, a process of recording the encrypted data on a predetermined recording medium, and A data processing method to be executed by a data processing apparatus for executing the process of decrypting the read encrypted data using the algorithm and key used to encrypt the encrypted data into the processing target data
- the data processing apparatus generates a new solution by substituting at least one of the past solutions and a process of cutting the processing target data into a plurality of plaintext cut data by cutting each predetermined bit number
- a process of sequentially generating new solutions each time the data to be processed is encrypted by substituting past solutions into a predetermined solution generation algorithm that can be performed.
- the first algorithm generation process for sequentially generating a new algorithm every time the processing target data is encrypted using the generated solution, and the plaintext cut data is related to the processing target data.
- the process of matching the number of bits of the plaintext cut data with the reference number of bits as a reference, and the plaintext cut data by the key and the algorithm generated by the first algorithm generation process A process of encrypting each of the reference bits to obtain encrypted cut data, a process of recording encrypted data in which the cipher key cut data is collected on the recording medium, and an encryption recorded on the recording medium
- a second algorithm generation process that generates the same new algorithm as that generated in the rhythm generation process, and the encrypted data for each bit number that is disconnected when the encrypted data is encrypted.
- Cutting into a plurality of encrypted cut data, the key used when encrypting the encrypted cut data and the encryption generated by the second algorithm generating step Decrypting each reference bit number into the plaintext cut data by the same algorithm used when encrypting the encrypted data, and connecting the decrypted plaintext cut data to the processing target data
- the data processing device encrypts a plurality of data to be processed into encrypted data, and a plurality of the ciphers
- the encrypted data is decrypted in the same order as they were encrypted, and the processing target data is converted into at least one of the plaintext cut data by another plaintext cut data.
- the number of bits is different from that of the data, and cutting is performed so that the number of bits is shorter than the reference number of bits.
- a process of encrypting the processing target data which is plaintext, using a predetermined algorithm and a predetermined key to obtain encrypted data
- a process of recording the key data on a predetermined recording medium and the recording
- Executed by the data processing device that executes the process of decrypting the encrypted data read from the medium using the algorithm and key used to encrypt the signature data to the processing target data
- a method of processing data wherein the data processing device cuts the processing target data into a plurality of plaintext cut data by cutting the data to be processed every predetermined number of bits, and assigns at least one of past solutions. By substituting the past solution into a predetermined solution generation algorithm that can generate a new solution in step 1, a new solution is sequentially added each time the data to be processed is encrypted.
- a first key generation process that sequentially generates a new key for performing encryption of the processing target data using the generated solution, and the plaintext cut data includes the processing target data and Includes unrelated dummy data, and the plaintext cut data is generated by the algorithm and the first key generation process by matching the number of bits of the plaintext cut data with the reference bit number as a reference.
- a process of encrypting the encrypted cut data by encrypting each reference bit number with a key, a process of recording the encrypted data including the encrypted cut data on the recording medium, and a recording medium recorded on the recording medium. Each time the encrypted data is read from the recording medium and the encrypted data is decrypted using the generated solution, the first encrypted data is sequentially generated in the first key generating process.
- a second key generation process for generating the same new key, and the encrypted data is cut into a plurality of bits by the same number of bits as when the encrypted data was decoded.
- a process of decoding the data into the plaintext cut data for each reference bit number using the same key used when converting the data, and a process of connecting the decrypted plaintext cut data to the processing target data The data processing apparatus encrypts a plurality of data to be processed into encrypted data, and decrypts the plurality of encrypted data in the same order as they are encrypted.
- the processing target data is cut so that at least one of the plaintext cut data has a bit number different from that of the other plaintext cut data so that the number of bits is shorter than the reference bit number. It is a processing method.
- the two most recent data processing devices can be configured as follows with two solution generation means.
- a data processing apparatus configured to decrypt a plurality of the encrypted data in the same order as they are signed, wherein the data to be processed has a predetermined number of bits. Each piece of data is cut into a plurality of pieces of plaintext cut data, and the encrypted data is cut into a plurality of bits by the same number of bits that was cut when the encrypted data was encrypted.
- the processing target First solution generating means for sequentially generating new solutions each time data is encrypted, and sequentially using the solution generated by the first solution generating means to encrypt the data to be processed
- second algorithm generating means for sequentially generating the same new algorithm as generated by the first algorithm generating means, and the plaintext cut data as a key, And a key used when encrypting the encrypted cut data using the algorithm generated by the first algorithm generating means and encrypting the encrypted cut data, And its encryption generated by said second algorithm generating means
- Data is decrypted into the plaintext cut data by the same algorithm used when encrypting the data, and the encryption or the decryption is performed for each reference number of bits.
- the encrypted data decrypting means and the encrypted data obtained by collecting the encrypted cut data encrypted by the encrypting / decrypting means are recorded on the recording medium, and the recording Read / write means for reading encrypted data recorded on a medium from the recording medium, and connection means for connecting the decrypted plaintext cut data to the data to be processed.
- the means cuts the processing target data into a bit number shorter than the reference bit number so that at least one of the processing target data has a different bit number from other processing target data.
- a mixing unit that includes dummy data that is not related to the processing target data in the plain text cut data so that the number of bits of the plain text cut data matches the number of reference bits. It is a data processing device.
- the data to be processed in plain text is encrypted using a predetermined algorithm and a predetermined key to obtain encrypted data, a recording medium for recording the encrypted data, and encrypted data read from the recording medium.
- the data processing apparatus is configured to decrypt a plurality of the encrypted data in the same order as they are encrypted, and cuts the processing target data every predetermined number of bits. A plurality of plaintext cut data, and the encrypted data is cut by the same number of bits as the encrypted data was cut when the encrypted data was encrypted.
- Second solution generating means for generating a simple solution, and each time the first key generating means sequentially generates the decrypted encrypted data using the solution generated by the second solution generating means.
- a second key generating means for generating the same new key; and the plaintext cut data is encrypted with an algorithm and a key generated by the first key generating means to obtain encrypted cut data.
- An algorithm used when signing the encrypted cut data with the encrypted cut data, and an algorithm used when encrypting the encrypted data generated by the second key generation means The encrypted key is decrypted with the same key as the plaintext cut data, and the encryption or decryption means is used to perform the encryption or the decryption for each reference number of reference bits.
- the number of bits is different from that of the data, so that the number of bits is shorter than the reference number of bits, and the plaintext cut data is not affected by the processing data.
- the data processing apparatus includes a mixing unit that includes one data to match the number of bits of the plaintext cut data with the reference number of bits.
- Data processing method executed by a data processing apparatus for performing the process of decrypting the encrypted data using the algorithm and key used to encrypt the data and the key to the data to be processed The data processing device cuts the data to be processed into a plurality of plaintext cut data by cutting the data to be processed every predetermined number of bits, and substitutes at least one of the past solutions to obtain a new solution. By substituting a past solution into a predetermined solution generation algorithm that can be generated, a new solution is sequentially generated each time the data to be processed is encrypted.
- a step of generating a first solution a step of matching the number of bits of the plaintext cut data with a reference number of bits by including dummy data unrelated to the processing target data in the plaintext cut data,
- a new algorithm is sequentially generated each time the data to be processed is generated using the solution generated in the first solution generation process, and the plaintext cut data is used as a key,
- New process by substituting at least one of the past solution, the process of reading the encrypted data recorded on the recording medium from the recording medium, and the past process.
- a second solution generation process for generating a new solution, and the first algorithm generation process in sequence each time decoding of the ⁇ signal data is performed using the solution generated in the second solution generation process.
- a second algorithm generation process for generating the same new algorithm as that generated, and the encrypted data is cut into a plurality of bits by the same number of bits as when the encrypted data was decoded.
- the process of converting to encrypted cut data, the key used when encrypting the encrypted cut data to the encrypted cut data, and the encrypted data generated by the second algorithm generating process The process of decrypting each plain bit number into plaintext cut data by the same algorithm used for encryption and connecting the decrypted plaintext cut data to the processing target
- the data processing apparatus encrypts a plurality of data to be processed into cipher data and encrypts the cipher data with a plurality of data to be encrypted. Decryption is performed in the same order, and the processing target data has a bit number shorter than the reference bit number so that at least one of the plaintext cut data has a different bit number from the other plaintext cut data. This is a data processing method.
- the process target data that is plaintext is encrypted using a predetermined algorithm and a predetermined key to obtain encrypted data, the process of recording the encrypted data on a predetermined recording medium, and reading from the recording medium
- Encrypted data A data processing method executed by a data processing apparatus that executes a process of decrypting and using the algorithm and key used when encrypting the data to process target data, wherein the data processing apparatus A process for cutting the data to be processed into a plurality of pieces of plaintext cut data by cutting every predetermined number of bits, and for generating a predetermined solution that can generate a new solution by substituting at least one of the past solutions
- a first solution generation process that sequentially generates new solutions each time the data to be processed is encrypted, and a solution generated in the first solution generation process are used.
- a first key generation process that sequentially generates a new key each time the processing target data is encrypted, and the plaintext cut data includes dummy data that is not related to the processing target data.
- the second solution generation process for generating the same new solution as that generated in the first solution generation process in each step, and the solution generated in the second solution generation process
- a second key generation process for sequentially generating the same new key as that generated in the first key generation process, and the encrypted data is stored in the encrypted data. Used to encrypt the encrypted cut data into the encrypted cut data by cutting the same number of bits that were cut at the time of encryption into a plurality of encrypted cut data.
- the third invention and the fourth invention can have various variations described in the first invention and the second invention, respectively.
- the fifth invention is as follows.
- the fifth invention includes a plurality of first data processing devices, the same number of second data processing devices as the first data processing devices paired with each of the plurality of first data processing devices, and third data processing. Communication between the first data processing device and the second data processing device using encrypted data obtained by encrypting processing target data that is plaintext, and the second data processing device. And the third data processing device is a data processing system in which communication with data to be processed is performed.
- the data processing system includes a first device having the first data processing device, and a second device having the second data processing device and the third data processing device.
- the first data processing device and the second data processing device in the data processing system both cut the processing target data into a plurality of plaintext cut data by cutting each data into a predetermined number of bits.
- Cutting means that cuts encrypted data into a plurality of encrypted cut data by cutting the same data every bit number that was cut when the encrypted data was encrypted.
- the second data processing device the solution generating means for sequentially generating different solutions from the other first data processing device and the second data processing device, the plaintext cut data, the solution generation
- the encrypted data is encrypted by the algorithm common to the first data processing device and the second data processing device generated based on the solution received from the means
- the encrypted cut data is obtained.
- the encrypted cut data is decrypted into plaintext cut data by the algorithm used when encrypting the encrypted cut data, and the plaintext cut data is decrypted.
- the third data processing device in this data processing system is any of the data processing devices described in the first to fourth inventions, and the second data processing device is Encrypted processing target data generated by decrypting encrypted data encrypted by the first data processing apparatus, records the encrypted data on the recording medium, and reads the encrypted data from the recording medium Is decrypted and sent to the second data processing device.
- This data processing system is an application of the data processing apparatus described so far. Between the first device having the first data processing device and the second device having the second data processing device and the third data processing device, the first data processing device and the second data processing device are wirelessly connected. Alternatively, data is exchanged by wire. Therefore, the second data processing apparatus can record the processing target data received from a large number of first data processing apparatuses in an encrypted state on the recording medium of the second data processing apparatus.
- the advantage of this data processing system is that such one-to-many processing can be performed.
- FIG. 1 is a diagram showing an overall configuration of a data processing system in the first embodiment.
- FIG. 2 is a diagram showing a hardware configuration of the first data processing device included in the data processing system shown in FIG.
- FIG. 3 is a block diagram showing a configuration of a communication device included in the first data processing device shown in FIG.
- FIG. 4 is a block diagram showing a configuration of the encryption device included in the first data processing device shown in FIG.
- FIG. 5 is a diagram showing a hardware configuration of the second data processing device included in the data processing system shown in FIG.
- FIG. 6 is a block diagram showing the configuration of the encryption device included in the second data processing device shown in FIG.
- FIG. 7 is a block diagram showing a configuration of another encryption device included in the second data processing device shown in FIG.
- FIG. 8 is a block diagram showing a configuration of a communication device included in the second data processing device shown in FIG.
- FIG. 9 shows the flow of processing executed in the data processing system shown in Fig. 1.
- FIG. 9 shows the flow of processing executed in the data processing system shown in Fig. 1.
- FIG. 10 is a flowchart showing the flow of processing executed in S 1 10 shown in FIG.
- FIG. 11 is a flowchart showing the flow of processing executed in S 1 30 shown in FIG.
- FIG. 12 is a flowchart showing the flow of processing executed in S 1 40 shown in FIG.
- FIG. 13 is a flowchart showing the flow of processing executed in S 1 50 shown in FIG.
- FIG. 14 is a diagram illustrating a hardware configuration of the encryption device included in the data processing device according to the second embodiment.
- FIG. 15 is a flowchart showing the flow of encryption processing executed by the data processing apparatus according to the second embodiment.
- FIG. 16 is a flowchart showing the flow of the decryption process executed by the data processing apparatus in the second embodiment.
- FIG. 17 is a diagram showing a hardware configuration of an encryption device included in a modification of the data processing device according to the second embodiment.
- the data processing system according to this embodiment is schematically configured as shown in FIG.
- the data processing system includes a plurality of first data processing devices 11 and a second data processing device 12 connected to each other via a network 13.
- the network 13 is a LAN (Local Area Network).
- the plurality of first data processing devices 11 and the second data processing device 12 perform encrypted communication with each other.
- the network 13 may have other configurations as long as data exchange between the first data processing device 11 and the second data processing device 12 is possible.
- the configurations of the first data processing device 11 and the second data processing device 12 will be described. First, The configuration of the first data processing device 11 will be described.
- the hardware configuration of the first data processing device 11 is shown in FIG.
- the first data processing device 1 1 includes a CPU (central processing unit) 21, ROM (read only memory) 22, HDD (hard disk drive) 23 RAM (random access memory) 24, input device 25, display It includes a device 26, an encryption device 27, a communication device 28, and a bus 29.
- CPU 21, ROM 22, HDD 23, RAM 24, input device 25, display device 26, encryption device 27, and communication device 28 can exchange data via bus 29.
- the ROM 22 or the HDD 23 may include a predetermined program and predetermined data (this may include data to be processed, and in this embodiment, this is the case. Contains data necessary to execute the above program.)
- the CPU 21 controls the entire first data processing device 11 and executes processing to be described later based on programs and data stored in the ROM 22 or the HDD 23.
- the RAM 24 is used as a working storage area when the CPU 21 performs processing.
- the input device 25 is composed of a keyboard, a mouse, and the like, and is used for inputting commands.
- the display device 26 is composed of an LCD (liquid crystal display), a CRT (cathode ray tube), and the like, and is used to display commands, input data, processing status described later, and the like.
- the encryption device 27 performs encryption of processing target data and decryption of encrypted data, which will be described later.
- the communication device 28 performs communication with the second data processing device 12 via the network 13. Note that the communication device 28 of the second data processing device 12 executes communication with the first data processing device 11 via the network 13.
- FIG. 3 shows a block configuration diagram of the communication device 28.
- the communication device 28 includes an interface unit 281, an authentication data generation unit 282, and a communication unit 283.
- the interface unit 281 is used for data transmission between the bus 29 and the communication device 28. It is an exchange.
- the interface unit 2 8 1 sends the encrypted data received from the bus 29 to the authentication data generation unit 28 2, and sends the encrypted data received from the communication unit 28 3 to the bus 29. .
- the authentication data generation unit 2 8 2 adds authentication data to, for example, a header of encrypted data to be transmitted when transmission of encrypted data to be described later to the second data processing device 1 2 is performed. It is.
- the authentication data identifies the first data processing apparatus 11 that transmits the encrypted data.
- the authentication data is assigned to each first data processing device 11 by the administrator of the second data processing device 12 and is recorded in, for example, ROM 2 2 or HD D 2 3.
- the authentication data generation unit 28 2 adds the authentication data read from the ROM 22 or HD D 23 to the encrypted data.
- the second data processing device 12 determines from which first data processing device 11 the encrypted data is sent by the authentication data added to the received encoded data. I can grasp.
- the authentication data generation unit 2 8 2 is configured to send encrypted data to which the authentication data is added to the communication unit 2 8 3.
- the communication unit 28 3 sends the received encrypted data to the second data processing device 12.
- Figure 4 shows a block diagram of the encryption device 27.
- the encryption device 27 includes an interface unit 2 7 1, a preprocessing unit 2 7 2, an encryption / decryption unit 2 7 3, a solution generation unit 2 7 4, an algorithm generation unit 2 7 5, and a key generation unit 2 7 6 and connection 2 7 7
- the interface unit 2 71 1 exchanges data between the bus 29 and the communication device 28.
- the interface unit 2 7 1 receives the processing target data from the HD DHH 2 3 via the bus 2 9 and receives the encrypted data from the communication unit 2 8 via the bus 2 9. Data to be processed or encrypted data is sent to the preprocessor 2 72. Further, when the interface unit 2 71 receives the data to be processed or the data “ ⁇ ”, the interface unit 27 1 sends data indicating that to the solution generation unit 2 74. On the other hand, as will be described later, the interface unit 2 71 receives the processing target data or the signature data from the connection unit 2 7 7, and the received processing target data or encryption key data is received by the bus 2. I am going to send it to 9.
- the pre-processing unit 2 7 2 cuts the processing target data or encrypted data received from the bus 29 via the interface unit 2 71 and cuts the plaintext cut data or encryption data by a predetermined number of bits. It has a function to generate the encrypted cut data and send it to the encryption / decryption unit 2 7 3. How to cut the data to be processed or encrypted data will be described later.
- the preprocessing unit 2 72 has a function of including dummy data, which is data unrelated to the processing target data, in a method described later in the processing target data.
- the encryption / decryption unit 2 7 3 is the pre-processing unit
- the reference number of bits which is a processing unit when the cipher / decryption unit 2 7 3 performs the cipher / decryption process, is fixed in this embodiment.
- the reference number of bits in this embodiment is 8 bits, although not limited to this. Details of the encryption and decryption process will be described later.
- the solution generator 2 7 4 sequentially generates solutions.
- the solutions generated by the solution generator 2 7 4 of the first data processor 1 1 were generated in the same order as the solutions generated by the solution generator 2 7 4 A of the second data processor 1 2 described later.
- the solution is made to be the same.
- the solution in this embodiment is a pseudo-random number.
- the generated solution is sent to the preprocessor 2 7 2, the algorithm generator 2 75, and the key generator 2 7 6.
- the algorithm generator 2 75 generates an algorithm based on the solution received from the solution generator 2 74. This algorithm is used when the decryption unit 2 7 3 performs encryption processing and decryption processing.
- the key generation unit 2 76 generates a key based on the solution received from the solution generation unit 2 74.
- the key is used when the decryption unit 2 7 3 performs encryption processing and decryption processing.
- the connecting unit 2 7 7 decrypts the encrypted cut data by the decryption unit 2 7 3.
- the plaintext cut data generated by the above is connected in the original order to make a batch of data to be processed. This data to be processed is sent to the interface unit 2 71 and is sent to the HD D 2 3 or the CPU 2 1 or the like via the bus 29 if necessary.
- the connecting unit 2 7 7 also connects encrypted cut data generated by encrypting the plain text cut data in the decryption unit 2 7 3 into a set of encrypted data. It has a function. This encrypted data is sent to the interface unit 2 7 1, and from there, it is sent to the communication unit 2 8 3 of the communication device 2 8 via the bus 29, and further from the communication unit 2 8 3 to the second unit.
- the connecting unit 2 7 7 does not have to have a function of connecting encrypted cut data generated by encrypting the plain text cut data in the encryption decoder 2 7 3. .
- the encrypted cut data is sent to the communication device on the other party side in the order of encryption. If the connection unit 2 7 7 is such, the encrypted disconnection data can be sent directly to the communication unit 2 8 3 without passing through the connection unit 2 7 7.
- the hardware configuration of the second data processing device 12 is as shown in FIG.
- the hardware configuration of the second data processing device 1 2 is basically the same as that of the first data processing device 1 1, but there are two encryption devices 2 7 that are one in the first data processing device 1 1. It differs from the first data processing device 11 in that an encryption device 2 7 A and an encryption device 2 7 B are provided instead of the encryption device 27.
- CPU 2 1, ROM 2 2, HD D 2 3, RAM 2 4, input device 2 5, display device 2 6, bus 2 9 in the second data processing device 1 2 are the first data processing device 1 1 are similar to those in
- the encryption device 2 7 A and the encryption device 2 7 B have the same functions as the encryption device 27 in the first data processing device 11 1 for encrypting data to be processed and decrypting the encrypted data. It has. In the following, both configurations will be described in order.
- the number of encryption devices 27 A is the same as the number of first data processing devices 11, and each of them is associated with one of the first data processing devices 11. That is, the encryption device 27 A and the first data processing device 11 that are associated with each other are processed by the other party. The encrypted data generated by encrypting the target data can be decrypted. Conversely, the encryption device 27 A and the first data processing device 11 that are not associated with each other can no longer decrypt encrypted data generated by the other party encrypting the data to be processed. ing.
- the encryption device 27 A is configured as shown in FIG.
- the encryption device 2 7 A consists of an interface unit 2 7 1 A, a pre-processing unit 2 7 2 A, an encryption key decryption unit 2 7 3 A, a solution generation unit 2 7 4 A, and an algorithm generation unit 2 7 It consists of 5 A, key generator 2 7 6 A, and connection 2 7 7 A.
- the interface unit 2 7 1 A receives data to be processed from the encryption device 2 7 B via the bus 29, and receives encrypted data from the communication unit 28 via the bus 29.
- the received processing target data or encrypted data is sent to the preprocessing unit 2 7 2 A.
- the interface unit 2 71 1 A receives the data to be processed or the encrypted data
- the interface unit 2 7 1 A sends data indicating that to the solution generation unit 2 7 4 A.
- the interface unit 2 7 1 A receives processing target data or encrypted data from the connection unit 2 7 7 A, and the received processing target data or encrypted data is received. To send to bus 29.
- the pre-processing unit 2 7 2 A cuts the processing target data or encrypted data received from the bus 29 via the interface unit 2 7 1 A every predetermined number of bits, and cuts the plaintext cut data or encryption This function has the function to generate data to be converted and sent to the decryption unit 2 7 3 A.
- the preprocessing unit 2 72 2 A has a function of including dummy data, which is data unrelated to the processing target data, in the processing target data by a method described later.
- the encryption / decryption unit 2 7 3 A receives the plaintext cut data or the encrypted cut data from the pre-processing unit 2 7 2 A, and when it receives the plaintext cut data, In the case of receiving the sign cut data, it has a function of decoding it.
- the encryption / decryption unit 2 7 3 A has a fixed number of reference bits, which is a processing unit when performing encryption and decryption processing.
- the reference bit number in this embodiment is 8 bits, although not limited to this. Encryption and decryption Details of the processing of No. ii will be described later.
- the solution generator 2 7 4 A sequentially generates solutions.
- the solution generated by the solution generator 2 7 4 A is set so that the solution generated by the solution generator 2 7 4 of the first data processing device 1 1 is the same as the solution generated in the same order. Yes.
- the generated solution is sent to the preprocessing unit 2 7 2 A, the algorithm generation unit 2 75 A, and the key generation unit 2 7 6 A.
- the algorithm generator 2 75 5 A generates an algorithm based on the solution received from the solution generator 2 7 4 A. This algorithm is used when the ⁇ ⁇ 'decoding section 2 7 3 A performs the ⁇ ⁇ ⁇ processing and the decryption processing.
- the algorithm generated by the algorithm generator 2 75 5 A in the second data processor 1 2 is the same as the algorithm generated in the same order by the algorithm generator 2 75 5 in the first data processor 1 1. Has been.
- Key generation unit 2 7 6 A generates a key based on the solution received from solution generation unit 2 7 4 A.
- the key is used when the encryption / decryption unit 2 7 3 A performs encryption processing and decryption processing.
- the key generated by the key generation unit 2 76 6 A in the second data processing device 12 is the same as the key generated in the same order by the key generation unit 2 76 in the first data processing device 11 Has been.
- the function of the connecting portion 2 77 A in the second data processing device 12 is the same as that of the first data processing device 11.
- the connection unit 2 7 7 A generates the processing target data by combining the plain text cut data generated by the decryption unit 2 7 3 A decrypting the cipher cut data To do.
- This processing target data is sent to the encryption device 27 B via the bus 29.
- the connecting unit 2 7 7 A also generates encrypted data by combining the encrypted cut data generated by the encryption 'decryption unit 2 7 3 A encrypting the plain text cut data. It is like that.
- This encrypted data is sent to the first data processing device 11 via the communication device 28.
- the encryption device 2 7 B encrypts the data to be processed, and the encryption device 2 7 A decrypts the encrypted data generated by the first data processing device 1 1. It has a function of encrypting the generated processing target data again.
- the encryption device 27 B records the generated encrypted data on the HD D 23 in the second data processing device 12.
- the encryption device 27 B has a function of decrypting the encrypted data read from the HD D 23.
- the encryption device 2 7 B is configured as shown in FIG.
- the encryption device 2 7 B includes an interface unit 2 7 1 B, a preprocessing unit 2 7 2 B, an encryption / decryption unit 2 7 3 B, a solution generation unit 2 7 4 B, and an algorithm generation unit 2 7 5 B, key generation unit 2 7 6 B, connection unit 2 7 7 B, and specific information generation unit 2 7 8 B.
- the interface unit 2 7 1 B of the encryption device 2 7 B receives the data to be processed from the encryption device 2 7 A via the bus 29 and the second data processing device 1 2 via the bus 29. It is designed to receive the encoded data from the HD D 2 3 and send the received processing target data or encrypted data to the pre-processing unit 2 7 2 B. In addition, when the interface unit 2 7 1 B receives the data to be processed or the encrypted data, the interface unit 2 7 1 B sends data indicating that to the solution generation unit 2 7 4 B.
- the interface unit 2 7 1 B receives the data to be processed from the connection unit 2 7 7 B in the encryption device 2 7 B and the encrypted data from the specific information generation unit 2 7 8 B.
- the received processing target data or encrypted data is sent to the bus 29.
- the preprocessing unit 2 7 2 B cuts the processing target data or encrypted data received from the bus 29 via the interface unit 2 7 1 B every predetermined number of bits, and cuts the plaintext data or encryption. It has a function to generate cut data and send it to the encryption / decryption unit 2 7 3 B.
- the preprocessing unit 2 72 B has a function of including dummy data, which is data unrelated to the processing target data, in the processing target data by a method described later.
- the encryption key decryption unit 2 7 3 B receives the plaintext cut data or the encrypted cut data from the preprocessing unit 2 7 2 B, and encrypts the plaintext cut data when it is received. When cutting data is received, it has a function of decoding it.
- the encryption / decryption unit 2 7 3 B in this embodiment has a fixed number of reference bits, which is a processing unit when performing encryption and decryption processing. In this embodiment The standard number of bits is 8 bits, though not limited to this. Details of the encryption and decryption process will be described later. In this case, the decryption unit 2 7 3 B performs decryption by using an algorithm and a key specified based on specific information described later. .
- the solution generator 2 7 4 B sequentially generates solutions.
- the solution generated by the solution generator 2 7 4 B is a pseudo-random number.
- the generated solution is sent to the algorithm generation unit 2 75 B and the key generation unit 2 7 6 B. In this embodiment, the solution is also sent to the preprocessing unit 2 7 2 B.
- the algorithm generator 2 75 5 B generates an algorithm based on the solution received from the solution generator 2 7 4 B. This algorithm is used when performing encryption processing and decryption processing in the encryption unit 2 7 3 B.
- Key generation unit 2 7 6 B generates a key based on the solution received from solution generation unit 2 7 4 B. The key is used when the encryption / decryption unit 2 7 3 B performs encryption processing and decryption processing.
- the key generated by the key generation unit 2 76 6 B in the second data processing device 12 is the same as the key generated in the same order by the key generation unit 2 76 in the first data processing device 11 Has been.
- connection unit 2 7 7 B in the second data processing device 1 2 connects the plaintext cut data generated by the encryption / decryption unit 2 7 3 B decrypting the encrypted cut data. It has a function of generating processing target data. This processing target data is sent to the encryption device 27 A. 'Connector 2 7 7 B also generates encrypted data by combining the encrypted cut data generated by encrypting the plain text cut data It is supposed to be. This encrypted data is recorded on the HD D 23 in the second data processing device 12.
- the encryption device 2 7 B includes a specific information generation unit 2 7 8 B.
- the specific information generation unit 2 7 8 B adds specific information to the encrypted data generated by the connection unit 2 7 7 B.
- This specific information is information for specifying the algorithm and key used when encrypting the encrypted data to which the specific information is added.
- the algorithm itself used to encrypt the key data, the key itself used to encrypt the key data, and the encrypted data are encrypted.
- This is the algorithm used to generate the key, the solution itself used to generate the key, or information indicating the order of the generated solution.
- the identification information is a power for identifying both the algorithm and the key, or a solution used for generating the algorithm and the key.
- the specific information generation unit 2 7 8 B adds the specific information to the encrypted data.
- the specific information is stored in a different location from the encrypted data. It may be stored after being associated with the key data.
- the configuration of the communication device 28 in the second data processing device 12 is substantially the same as the configuration of the communication device 28 in the first data processing device 11.
- the functions of the interface unit 2 8 1 and the communication unit 2 8 3 are the same as those in the communication device 2 8 of the first data processing device 11.
- the communication device 2 8 of the second data processing device 1 2 includes the authentication unit 2 8 4 instead of the authentication data generation unit 2 8 2 in the first data processing device 1 1 in that the first data processing device 1 1
- the communication device is different from 2-8.
- the authentication unit 28 4 4 reads out the authentication data included in the header in this embodiment of the sign data received from the first data processing device 11 1, and the encrypted data is the first data processing device 1. It is to judge whether it came from 1. ⁇ ⁇ ⁇ data is sent via the interface unit 2 81 to the encryption device 27 A associated with the first data processing device 11 that is the transmission source.
- the encryption device 27 of the first data processing device 11 of the plurality of first data processing devices 11 encrypts the data to be processed to generate the signature data (S 1 1 0).
- the first data processing device 11 sends the encrypted data to the second data processing device 12 (S 1 2 0).
- the second data processing device 12 sends the encrypted data to the second data processing device 12 (S 1 2 0).
- the encrypted data is decrypted and returned to the processing target data (S 1 3 0).
- the decrypted data to be processed is encrypted by the encryption device 27 B and recorded in the HD D 23 in the second data processing device 12 (S 14 0).
- the encryption device 2 7 B decrypts the encrypted data in the HD D 23 and returns it to the processing target data (S 1 5 0 ).
- the encryption device 2 7 A encrypts the processing target data into encrypted data (S 1 60).
- the second data processing device 12 sends the encrypted data to the first data processing device (S 1 7 0).
- the encrypted data is decrypted by the encryption device 27 in the first data processing device 11 and returned to the original data to be processed (S 1 8 0).
- the encryption device 27 of one first data processing device 11 among a plurality of first data processing devices 1 1 encrypts the data to be processed and generates encrypted data. The process will be described in detail with reference to FIG.
- the data to be processed can be any data that needs to be transmitted from the first data processing device 1 1 to the second data processing device 1 2.
- the processing target data is recorded in HD D 23.
- Data read into the first data processing device 11 from another recording medium such as an external recording medium may be the processing target data.
- the CPU 21 reads the processing target data from the HD D 23, for example, RAM 2 4 To record temporarily.
- This data to be processed is sent from the HD D 2 3 through the bus 29 to the ⁇ sign device 27.
- this processing target data is sent to the preprocessing unit 2 72 via the interface unit 2 71.
- the data to be processed is cut into a plain text cut data every predetermined number of bits (S 1 1 0 2).
- the pre-processor 2 7 2 includes dummy data in the plaintext cut data as necessary.
- the plain text cut data is generated from the processing target data by one of the following three methods. It has become.
- the processing target data is cut into a plain text cut data by cutting it into a fixed number of bits shorter than the reference bit number, and all of the plaintext cut data whose bit number is shorter than the reference bit number B) Dummy data is included at the position of B)
- the processing target data is cut into a certain number of bits shorter than the reference bit number to obtain plain text cut data, and all of them are shorter in bit number than the reference bit number. Including dummy data at different positions in the plaintext cut data
- the processing target data is cut into plain text cut data by cutting it to the same or shorter number of bits as the reference bit number, and dummy data is included in each plain text cut data having a bit number shorter than the reference bit number.
- the solution generation unit 2 7 4 receives the information from the interface unit 2 7 1.
- the solution generator 2 7 4 starts generating the solution.
- the solution generation unit 27 4 generates a solution every time processing target data is received by the interface unit 2 71.
- the solution in this embodiment is an 8-by-8 matrix (X).
- the solution generator 2 74 does not necessarily have to be so, but in this embodiment, the solution is generated continuously as if it is a nonlinear transition. This solution results in a pseudo-random number.
- the solution is generated continuously as if it is a nonlinear transition. This solution results in a pseudo-random number.
- (1) In the process of generating the solution, the calculation of the power of the past solution is included.
- (2) In the process of generating the solution, the past 2 It is possible to consider a method that includes the multiplication of the above solutions or a combination of (1) and (2).
- the solution generator 274 has the 01st solution (X 01 ) and the 02nd solution (X 02 ) as predetermined initial matrices (for example, the 01st solution and the 02nd solution).
- the solution is recorded in a predetermined memory such as HDD 23 or ROM22).
- Each initial data processor 11 has a different initial matrix. Therefore, the solutions generated in each first data processor 11 are different from each other.
- each of the plurality of key devices 27 A in the second data processing device 12 has the same initial matrix as the first data processing device 11 associated with each encryption device 27 A. Yes.
- the solution generator 274 assigns this initial matrix to the solution generation algorithm and generates the first solution (Xi) as follows.
- the solution generating unit 274 generates a second solution of (chi 2) as follows.
- the solution generation unit 274 generates the third solution, the fourth solution,..., The first solution as follows.
- the solution generated in this way is sent to the preprocessing unit 272, the algorithm generation unit 275, and the key generation unit 276 and is held by the solution generation unit 274.
- the solution generator 2 7 4 in order to generate the N-th solution (X N ), the N-th 1 solution (X N — J-and the N-th 2 solution (X N _ 2 ) are generated immediately before that. Therefore, the solution generator 2 7 4 must hold the two most recently generated solutions (or the solution generator 2 7 4 in order to generate a new solution). (Someone else must hold these two solutions.) Conversely, solutions that are older than the two most recently generated solutions will be used in the future to generate new solutions. Therefore, in this embodiment, the solution generation unit 2 7 4 always keeps the past two solutions, but the latest solution is the third solution by generating a new solution. The solution that was the second solution until then is deleted from the specified memory where the solution was recorded. To do.
- the generation unit 2 74 has two initial matrices when using the formula (a) or (c), and four initial matrices when using the formula (b). '
- the above-mentioned parameter is a constant, it can be used as specific changing environmental information.
- This environmental information is information that occurs naturally one after another and can be obtained in common at distant locations.For example, information that is determined based on the weather in a specific region, For example, information determined based on the contents of a television broadcast of a certain TV station, information determined based on the results of a specific sport, etc. - From such environmental information, if the above-mentioned c is created one after another and common information is generated, the confidentiality of communication can be further enhanced.
- the preprocessing unit 2 72 which has received the solution (that is, the above-described solution) accordingly determines whether the plaintext cut data is generated by any of the above-described methods A), B), or C). decide.
- this is not limited, but the sum of the numbers that make up the 8-by-8 matrix that is the solution is divided by 3, and when the remainder is 0, the method of A) When the remainder is 1, the plaintext cut data is generated by the method B), and when the remainder is 2, the method C) is used.
- the preprocessing unit 2 7 2 receives the processing target data received from the interface unit 2 71 in order from the top, and is a constant bit shorter than the reference bit number.
- the plain text cut data is generated by cutting by number (7 bits in this embodiment).
- the preprocessing unit 2 72 embeds dummy data at a fixed position in the plaintext cut data. Note that the position in the plain text cut data for embedding the dummy data may change or may be fixed. In the latter case, the position where the dummy data is embedded can be a predetermined intermediate position such as the beginning or end of the plaintext cut data or the second bit or the third bit.
- the dummy data may be any data as long as it is unrelated to the processing target data.
- the pre-processing unit 2 72 cuts the data to be processed into a certain number of bits (for example, 7 bits) shorter than the reference number of bits.
- the plaintext cut data is included, and dummy data is included in each different position of the plaintext cut data, all of which are shorter than the reference bit number.
- the embedded position of the dummy data may be fixed, or the first bit, the second bit, the third bit, etc. for each of the plaintext cut data, the eighth bit, the first bit, and the second bit. ... 8th bit, and so on. It may change regularly, or it may change randomly.
- the position where dummy data is embedded changes randomly, for example, the position where dummy data is embedded may be determined based on the solution.
- the data can be cut into random lengths shorter than 8 bits, for example, the sum of the numbers that make up the 8 by 8 matrix that is the solution is divided by 8. If the remainder is 0, the beginning of the processing target data at that point is cut by 8 bits, and if the remainder is 1, the beginning of the processing target data at that point in time If the remainder is 2, the first part of the data to be processed at that time is cut by 2 bits. If the remainder is 7, the first part of the data to be processed at that time is 7 bits. It can be cut with.
- the preprocessing unit 2 72 embeds dummy data in each of the plaintext cut data having a bit number shorter than the reference bit number among the plaintext cut data generated thereby.
- the dummy data embedding position may be a specific position such as a head or tail, or may be a predetermined changing position specified by a solution.
- the plaintext cut data generated in this way is sent in a stream to the encryption / decryption part 2 73 in the order of generation.
- the algorithm generation unit 2 7 5 Force Generates an algorithm used to encrypt the plaintext cut data.
- the algorithm generator 2 75 in this embodiment generates an algorithm based on the solution.
- the algorithm generation unit 2 75 generates the algorithm as follows.
- the algorithm in this embodiment is as follows: “When the plaintext cut data that is 8-bit data is a 1-by-8 matrix Y, the solution is an 8-by-8 matrix X that is a power, It is defined as a matrix that is obtained by multiplying a matrix rotated by n X 90 ° clockwise around Y ”.
- a may be a predetermined constant, but in this embodiment, a is a number that changes based on the solution. In other words, the algorithm in this embodiment changes based on the solution.
- a is the remainder when the number obtained by adding all the elements of the matrix included in the solution that is an 8-by-8 matrix is divided by 5 (provided that the remainder is 0) Can be defined as follows.
- n is a predetermined number determined by the key. If the key is a fixed number, n is fixed, but the key changes based on the solution, as explained below. In other words, in this embodiment, this n also changes based on the solution. However, the algorithm can be determined as something else.
- the algorithm generator 2 75 receives the solution from the solution generator 2 7 4. Each time it is taken, an algorithm is generated and sent to the decoding unit 2 7 3.
- the key generation unit 2 76 In parallel with the generation of the plain text cut data, the key generation unit 2 76 generates a key used when encrypting the plain text cut data.
- the key generation unit 2 7 6 generates a key based on the solution.
- the key generation unit 2 76 generates the key as follows.
- the key in this embodiment is a number obtained by adding up all the elements of the matrix included in the solution that is a matrix of 8 rows and 8 columns. Thus, the key changes based on the solution in this embodiment.
- the key can be determined as something else.
- the key generation unit 2 76 generates a key every time a solution is received from the solution generation unit 2 74 and sends it to the encryption / decryption unit 2 7 3.
- the encryption / decryption unit 2 7 3 receives the plaintext received from the pre-processing unit 2 7 2 based on the algorithm received from the algorithm generation unit 2 7 5 and the key received from the key generation unit 2 7 6.
- the disconnected data is encrypted (S 1 1 0 3).
- the algorithm is as follows: ⁇ If the plaintext cut data, which is 8-bit data, is a 1-by-8 matrix Y, then the 8-row, 8-column matrix X, which is the solution, is raised to a power, It is a rule that is obtained by multiplying a matrix rotated by n X 90 ° around Y, and the key n is a number as described above.
- the data generated thereby is encrypted cut data.
- the encrypted disconnection data is sent to the connection unit 2 7 7.
- the connecting unit 2 7 7 connects the encrypted cut data together to generate encrypted data (S 1 1 0 4).
- the order of the encrypted cut data at this time corresponds to the order of the original plain text cut data.
- the process of S 1 1 0 in which the first data processing device 11 encrypts the processing target data to generate the encrypted data ends.
- the key sign data generated in this way is sent to the communication device 28 in the first data processing device 11 via the bus 29.
- the encrypted data is received by the interface 2 8 1 in the communication device and sent to the authentication data generation unit 2 8 2.
- the authentication data generation unit 2 8 2 sends the encrypted data to the communication unit 2 8 3 after attaching the authentication data to the header of the signature data data.
- the communication unit 28 3 sends the encrypted data to the second data processing device 12 via the network 13. As a result, the process of S 1 2 0 described above is executed.
- the process of S 1 3 0 is performed to decrypt the encrypted data and return it to the data to be processed.
- the encrypted data sent to the second data processing device 12 is received by the communication unit 28 3 in the communication device 28 of the second data processing device 12 (S 1 2 0 1).
- the communication unit 2 8 3 sends this encrypted data to the authentication unit 2 8 4.
- the authentication unit 2 8 4 determines from which first data processing device 11 the data of the key sign data comes from based on the authentication data attached to the encrypted data (S 1 2 0 2).
- the encrypted data is sent to the interface unit 2 8 1.
- the interface unit 2 8 1 sends the encrypted data to the encryption device 2 7 A associated with the first data processing device 1 1 determined as the transmission source of the encrypted data by the authentication unit 2 8 4. send.
- the preprocessing unit 2 7 2 A in the encryption device 2 7 A receives this encrypted data via the interface unit 2 7 1 A.
- the preprocessing unit 2 7 2 A cuts the received encrypted data every predetermined number of bits to generate encrypted cut data (S 1 2 0 3).
- the preprocessing unit 2 7 2 A When the encrypted data is cut to generate the encrypted cut data, the preprocessing unit 2 7 2 A performs a process reverse to that performed in the connection unit 2 7 7 of the first data processing device 11. In other words, the encrypted data is cut every 8 bits from the beginning and divided into multiple pieces of encrypted cut data.
- the sign-sign cut data is sent to the encryption / decryption part 2 7 3 A, where it is decrypted and converted to plain text cut data (S 1 2 0 4).
- Decryption is performed as the reverse of the processing performed by the encryption / decryption unit 2 73 in the first data processing device 11.
- the second data processing unit 1 2 requires an algorithm and a key that are required when encryption is performed in the first data processing unit 1 1.
- the algorithm and key used for decryption are generated in the encryption device 27 A. The mechanism will be explained.
- the solution generator 2 74 4 A generates a solution each time this information is received, triggered by the reception of this information.
- the solution generation unit 2 7 4 A in the encryption device 2 7 A of the second data processing device 1 2 generates the solution performed by the solution generation unit 2 7 4 of the first data processing device 1 1. It goes through the same process. Note that, as described above, the solution generation unit 2 7 4 A has the solution generation unit 2 of the first data processing device 11 associated with the encryption device 2 7 A including the solution generation unit 2 7 4 A. 7 It has the same initial matrix that 4 had and a solution generation algorithm. Therefore, the solutions generated in the encryption device 2 7 A of the second data processing device 12 can be compared with those of the corresponding first data processing device 11 if the same generation order is compared. It is the same as the solution generated in the encryption device 27.
- the generated solution is sent from the solution generation unit 2 7 4 A to the preprocessing unit 2 7 2 A, the algorithm generation unit 2 7 5 A, and the key generation unit 2 7 6 A.
- the algorithm generator 2 7 5 A generates an algorithm each time a solution is received based on the received solution.
- the process of generating the algorithm by the algorithm generation unit 2 75 5 A of the second data processing device 12 is the same as the process of generating the algorithm by the algorithm generation unit 2 75 of the first data processing device 11.
- the generated algorithm is sent from the algorithm generator 2 75 A to the encryption / decryption module 2 7 3 A.
- the key generation unit 2 7 6 A generates a key each time a solution is received based on the received solution.
- the process of generating the key by the key generation unit 2 7 6 A of the second data processing device 12 is the same as the process of generating the key by the key generation unit 2 76 of the first data processing device 11.
- the generated key is sent from the key generation unit 2 7 6 A to the encryption decryption unit 2 7 3 A.
- encryption is performed by the first data processing device 1 1.
- a new solution is generated by the first data processing device 1 1, and the sign data generated by the first data processing device 1 1 is decoded by the second data processing device 1 2.
- Each time a new solution is generated by the second data processing device 12.
- the solutions generated by the encryption device 27 A of the second data processing unit 3 12 are compared with each other in the order in which they are generated. 1
- the encryption solution in 1 2 is the same as the solution generated by 7.
- the solution generated when encrypting the data to be processed which is the first data processing device 11, and the algorithm and key generated based on the solution are all generated by using the solution.
- the solution generated by the encryption device 27 A of the second data processing device 12 and the It always matches the algorithm and key generated based on the solution of. This situation also applies to the case where the second data processing device 12 performs the signature and the first data processing device 11 performs the decryption.
- the decryption unit 2 7 3 A performs the decryption process using the algorithm received from the algorithm generation unit 2 75 5 A. More specifically, the encryption / decryption unit 2 7 3 A uses the algorithm received from the algorithm generation unit 2 7 5 A (“the plaintext cut data that is 8-bit data is converted into a 1-by-8 matrix Y Is obtained by multiplying the matrix X, which is an 8 x 8 matrix X, which is the solution to the power of a, and rotated around B temple by n X 90 °, multiplied by Y.
- the algorithm for performing decryption processing based on the definition of “disconnected data” (when the encrypted cut data is viewed as a 1-by-8 matrix Z, the solution is 8 rows by 8 columns).
- the matrix obtained by multiplying the matrix X by a to the power of a and then rotating the clock clockwise by n X 90 ° is multiplied by Y to obtain the plaintext cut data ”
- the decryption process is performed by performing an operation according to the above definition using the key. In this way, the encryption decoder 2 7 3 A generates the plain text cut data by successively decrypting the signature cut data supplied in a stream from the pre-processor 2 7 2 A. .
- the ⁇ sign / decryption part 2 7 3 A removes the dummy data from the plaintext cut data as necessary (S 1 2 0 5).
- the solution generated by the solution generator 2 74 4 A is sent to the preprocessor 2 7 2 A.
- This solution is the first data processor 1 1 This was used in the preprocessor 2 7 2 to determine how the dummy data was embedded in the plaintext cut data.
- the solution that the preprocessing unit 2 7 2 A of the encryption device 2 7 A has at that time is decrypted by the encryption / decryption unit 2 7 3 A of the second data processing device 12 2. ⁇ finished (or decrypted, or now trying to decrypt) Encrypted data (more precisely, before the encrypted data was encrypted) This shows how the dummy data is embedded in the plaintext cut data.
- the pre-processing unit 2 7 2 A determines where the dummy data is embedded in the plaintext cut data decrypted by the encryption / decryption unit 2 7 3 A. Is sent to the ⁇ ⁇ ⁇ ⁇ decryption unit 2 7 3 A.
- the encryption / decryption unit 2 7 3 A removes the dummy data from the plaintext cut data.
- connection unit 2 7 7 A connects the received plaintext cut data all together and restores the original processing target data before being encrypted by the first data processing device 1 1 (S 1 2 0 6). In this way, the process of S 1 3 0 where the second data processing device 12 decrypts the encrypted data and returns it to the processing target data is completed.
- the generated processing target data is sent from the connection unit 2 7 7 A to the interface unit 2 7 1 A, and then sent to the signature device 2 7 B via the bus 29.
- the encryption device 27 B performs the above-described processing of S 1 40 0 to re-encrypt the decrypted data to be processed into encrypted data.
- the encryption processing in the encryption device 27 B is performed in a flow substantially similar to that in the first data processing device 11 (FIG. 12).
- the processing target data sent to the encryption device 2 7 B is received by the interface unit 2 7 1 B (S 1 3 0 1).
- the interface unit 2 7 1 B sends this to the preprocessing unit 2 7 2 B.
- the preprocessing unit 2 7 2 B cuts the received data to be processed every predetermined number of bits to generate plain text cut data (S 1 3 0 2).
- the method of cutting the data to be processed need not be the same as that of the encryption device 2 7 and the encryption device 2 7 A.
- the processing target data is disconnected by performing the same processing as described in the encryption device 27 and the encryption device 27 A.
- the preprocessing unit 27 2 B performs the same process as described in the encryption device 27 and includes dummy data in the plaintext cut data as necessary.
- the plain text cut data is sent to the ⁇ ⁇ ⁇ / ⁇ unit 2 7 3 B, where it is encrypted and converted into encrypted cut data (S 1 3 0 3).
- the solution generation unit 2 7 4 B receives the information from the interface unit 2 7 1 B.
- the solution generation unit 2 7 4 B only needs to be able to generate a solution at an appropriate timing, but the solution generation unit 2 7 4 B in this embodiment provides information that the processing target data has been received.
- a solution is generated on the occasion.
- the details of the solution generation are the same as described in the encryption device 27.
- the generated solution is sent to the algorithm generator 2 75 B and the key generator 2 7 6 B.
- the algorithm generation unit 2 7 5 B and the key generation unit 2 7 6 B perform the same processing as the algorithm generation unit 2 7 5 and the key generation unit 2 7 6 in the encryption device 2 7 to execute the algorithm and the key. Is generated.
- the generated algorithm and key are sent from the algorithm generation unit 2 75 B or the key generation unit 2 7 6 B to the encryption / decryption unit 2 7 3 B.
- the encryption unit 2 7 3 B receives the algorithm from the algorithm generation unit 2 7 5 B and the key from the key generation unit 2 7 6 B, and based on that, the pre-processing unit 2 7 2 B
- the received plaintext cut data is sequentially encrypted (S 1 3 0 3).
- the generated encrypted cut data is sequentially sent to the connection unit 2 7 7 B.
- the connecting unit 2 7 7 B collects the encryption key cut data as a group into encryption data (S 1 3 0 4). This encrypted data is sent to the specific information generator 2 7 8 B.
- the specific information generation unit 2 7 8 B performs the above-described process on the header of the received encrypted data, for example. Specific information is added (S 1 3 0 5).
- the encrypted data with the specific information attached is sent to the bus 29 via the interface 2 71 B and recorded on the HD D 2 3 in the second data processor 1 2. .
- the first data processing device 11 1 instructs that the encrypted data recorded on the HD D 23 in the second data processing device 12 be returned to the first data processing device 11.
- the second data processing device 12 executes the following processing.
- the interface unit 2 7 1 B in the encryption device 2 7 B of the second data processing device 1 2 reads the encrypted data from the HD D 2 3 via the bus 29 (S 1 4 0 1 ).
- the interface unit 2 7 1 B sends this encoded data to the preprocessing unit 2 7 2 B.
- the preprocessing unit 2 72 B cuts the received encrypted data every predetermined number of bits to generate decrypted data (S 1 4 0 2).
- the preprocessing unit 2 7 2 B When the encrypted data is cut to generate the encrypted cut data, the preprocessing unit 2 7 2 B performs the above processing performed by the preprocessing unit 2 7 2 A of the signature device 2 7 A when performing the decryption. Perform the same process as described above. In other words, the encoded data is cut every 8 bits from the beginning and divided into a plurality of encrypted cut data.
- the encrypted cut data is sequentially sent to the encryption / decryption unit 2 7 3 B where it is decrypted and converted to plain text cut data (S 1 4 0 3).
- Decryption is executed as a process similar to the process described above performed by the encryption / decryption unit 2 7 3 A of the encryption device 27 A when performing decryption.
- the second data processing device 12 requires an algorithm and a key.
- the interface unit 2 71 1 B can read the specific information attached to the key data.
- This specific information is information for specifying the algorithm and key used to encrypt the encrypted data to which the specific information is added. For example, if the specific information is the algorithm and key itself that was used to encrypt the encrypted data, the interface 2 1 7 B reads this algorithm and key from the key data, which is pre-processed, for example, Part 2 7. 2 Send to ⁇ ⁇ ⁇ ⁇ Decoding part 2 7 3 B via B.
- the encryption key / decryption unit 2 7 3 B decrypts the encrypted cut data based on the algorithm and the key.
- interface 2 1 7 B reads this solution from the encrypted data, This is sent to the algorithm generation unit 2 7 5 B and the key generation unit 2 7 6 B.
- the algorithm generator 2 75 B and the key generator 2 7 6 B generate an algorithm and a key based on the accepted solution, respectively. This corresponds to the algorithm and key used when entering the data.
- the algorithm generation unit 2 7 5 B and the key generation unit 2 7 6 B send the generated algorithm and key to the encryption / decryption unit 2 7 3 B.
- the encryption key decryption part 2 7 3 B decrypts the encrypted cut data based on this algorithm and key.
- the interface 2 1 7 B reads this information from the key data and sends it to the solution generator 2 7 4 B.
- the solution generator 2 7 4 B that has received this information generates solutions up to the indicated order.
- This solution is the same as the solution used when encrypting the encryption data to which the above information was added. In this case, only the initial matrix is kept without being deleted so that the solutions generated in the same order are always the same.
- the solution generator 2 7 4 B sends the generated solution to the algorithm generator 2.7 5 B and the key generator 2 7 6 B.
- the algorithm generator 2 7 5 B and the key generator 2 7 6 B generate an algorithm and a key based on the accepted solution, respectively.
- the algorithm and the key are the encryption keys to which the solution is attached. It matches the algorithm and key used when encrypting the data.
- the algorithm generation unit 2 7 5 B and the key generation unit 2 7 6 B send the generated algorithm and key to the sign / decryption unit 2 7 3 B.
- the encryption / decryption unit 2 7 3 B uses the algorithm and key to Decrypt the data.
- the encrypted cut data is returned to the plain text cut data.
- the encryption key decoding unit 2 7 3 B removes the dummy data from the plaintext cut data as necessary (S 1 4 0 4).
- the encryption / decoding unit 2 7 3 B In addition, it requires a solution that was used for the previous encrypted plaintext data. If the specific information is the solution that was used when the plaintext cut data was encrypted last time, interface 2 1 7 B sends this solution to ⁇ ⁇ ⁇ 'decryption part 2 7 3 B send. If the specific information is information indicating the number of solutions generated when the plaintext cut data was previously encrypted, the solution generator 2 7 4 B The generated solution is sent to the encryption key decryption part 2 7 3 B. Using this solution, the encryption 'decryption unit 2 7 3 B removes the dummy data included in an appropriate position based on the solution.
- dummy data included in the plaintext cut data is included in an appropriate position based on the solution, the algorithm used to encrypt the encrypted data and the key itself are used. It is not preferable to do. This is because the encryption / decryption unit 2 7 3 B cannot obtain the solution and therefore cannot remove the dummy data.
- the plain text cut data from which the dummy data is removed is sent to the connection unit 2 7 7 B.
- the plaintext cut data is connected together at the connection unit 2 7 7 B and returned to the processing target data (S 1 4 0 5).
- This plaintext cut data is sent to the bus 29 via the interface part 2 71 1 B, and the first data processing requesting the transmission of the encrypted data is the source of this plaintext cut data. Sent to encryption device 2 7 A associated with device 1 1.
- the encryption device 27 A executes the above-described processing of S 1 600 to encrypt the processing target data into encrypted data.
- the encryption device 2 7 A performs the processing described in S 1 1 0 performed by the encryption device 2 7 of the first data processing device 11 when the processing target data is converted to encryption data. When Run as the same thing.
- the encryption data generated by the encryption device 2 7 A is sent to the communication device 2 8 in the second data processing device 12 via the bus 29, and from there, the encryption data is transmitted via the network 13 to the communication device 28. Is sent to the communication unit 2 8 of the first data processing device 1 1 that has requested transmission of the first data processing device 1 1. This corresponds to the processing of S 1 70 described above.
- This encrypted data is decrypted by the encryption device 27 in the first data processing device 11. This is the processing of S 1 80 described above. Note that the encryption device 2 7 performs this process by the encryption device 2 7 A of the second data processing device 1 2 when decrypting the encrypted data into the processing target data. It is executed as the same processing as described in 30.
- the encryption devices 2 7 A in the data processing device 1 2 can decrypt the encrypted data encrypted by the other party.
- the processing target data generated by decryption by the encryption device 27 in the first data processing device 1 1 is stored in the HD D in the first data processing device 11 before the processing of S 1 1 0 is performed. 2 Same as in 3 above.
- This processing target data is recorded in, for example, the HD D 23 in the first data processing device 11.
- the first data processing device 11 can use it appropriately.
- the hardware configuration of the data processing device in the second embodiment is the same as that of the first data processing device 11 in the first embodiment. However, since the data processing device in the second embodiment does not require communication, the first data processing device 11 does not have the communication device 28.
- the data processing device in the second embodiment includes a CPU 21, ROM 2 2, HDD 2 3, RAM 2 4, input device 2 5, display device 2 6, encryption device 2 7, and bus 2 9.
- Each of these functions basically includes the CPU 21 in the first data processing device 1 1, ROM 2 2, HD D 2 3, RAM 2 4, input device 2 5, and display device 2. 6. It matches the functions of the encryption device 2 7 and bus 2 9.
- the configuration of the encryption device 27 in the data processing device according to the second embodiment is the same as that of the encryption device 27 included in the first data processing device 11 according to the first embodiment (shown in FIG. 4).
- the algorithm generator 2 7 5 forces S
- the first algorithm generator 2 7 5 X and the second algorithm generator 2 7 5 Y have the key generator 2 7 6 forces 1 It differs from the encryption device 27 of the first embodiment in that it is replaced with a key generation unit 2 76 X and a second key generation unit 2 76 6 Y (FIG. 14).
- the data to be processed recorded in the HD D 23 is encrypted by the encryption device 27, and the encrypted data generated by the encryption is HD.
- the second embodiment there are a plurality of encrypted data to be decrypted, and the order in which the encrypted data is decrypted is that the encrypted data is processed from the data to be processed. It is made to correspond with the order of encryption.
- the difference between the encryption device 27 in the data processing device in the second embodiment and the encryption device 27 incorporated in the first data processing device 11 in the first embodiment is related to this point. It has become a thing.
- the encryption device 27 in the data processing device according to the second embodiment has a structure as shown in FIG.
- Interface unit 2 7 1 pre-processing unit 2 7 2, encryption / decryption unit 2 7 3, decryption unit 2 7 4, and encryption unit 27 in the data processing device in the second embodiment
- the connection unit 27 7 basically has the same functions as those in the encryption device 27 of the first data processing device 11 of the first embodiment.
- the interface unit 2 7 1 exchanges data between the bus 29 and the communication device 28.
- the pre-processing unit 2 7 2 cuts the processing target data or encrypted data received from the bus 29 via the interface unit 2 7 1 into the plaintext cut data or the encrypted data every predetermined number of bits. Generate the cut data and send it to the encryption / decryption section 2 7 3.
- the preprocessor 2 7 2 may include dummy data in the plaintext cut data.
- Encryption ⁇ Decryption Unit 2 7 3 Receives from 2 7 2 and encrypts plaintext cut data when it is accepted, and decrypts it when it accepts the cut data.
- the reference bit number which is a processing unit when performing the encryption / decryption processing, is fixed to 8 bits in this embodiment.
- the solution generator 2 7 4 sequentially generates solutions.
- the solution is generated every time the preprocessing unit 2 72 receives the processing target data.
- the solution is a pseudo-random number.
- the connection unit 2 7 7 connects the plain text cut data generated by the decryption of the encrypted cut data by the ⁇ ⁇ ⁇ decryption unit 2 7 3 in the original order and performs a batch process. It has a function to be subject data.
- the connecting unit 2 7 7 also has a function of connecting the encrypted cut data generated by encrypting the plain text cut data in the encryption key decrypting unit 2 7 3 to make a set of encrypted data. Have.
- the first algorithm generator 2 75 X generates an algorithm based on the solution received from the solution generator 2 74. This algorithm is used when performing ⁇ ⁇ ⁇ .
- Second algorithm generator 2 7 5 Y generates an algorithm based on the solution received from solution generator 2 7 4. This algorithm is used when performing decryption.
- the first algorithm generator 2 75 X and the second algorithm generator 2 75 5 Y are designed to generate the same algorithm when generating the algorithm using the same solution.
- the first key generation unit 2 76 X generates a key based on the solution received from the solution generation unit 2 74. This key is used when performing encryption.
- the second key generation unit 2 7 6 Y generates a key based on the solution received from the solution generation unit 2 7 4. This key is used when performing decryption.
- the first key generation unit 2 76 X and the second key generation unit 2 76 6 Y are configured to generate the same key when generating the key using the same solution.
- the first algorithm generating unit 2 75 X and the first key generating unit 2 7 6 X generate an algorithm and a key each time the preprocessing unit 2 72 receives the processing target data.
- the second algorithm generation unit 2 75 Y and the second key generation unit 2 7 6 Y generate an algorithm and a key when the preprocessing unit 2 72 accepts the encrypted data.
- the operation of the data processing apparatus in the second embodiment will be described with reference to FIG. First, data to be processed is read (S 1 5 0,1).
- the processing target data is read from HD D 23 in this embodiment.
- the data to be processed is sent to the encryption device 27 through the HD D 23 force and the nose 29. More specifically, the processing target data is sent to the preprocessing unit 2 72 via the interface unit 2 71.
- the data to be processed is cut into a plaintext cut data every predetermined number of bits (S 15 500).
- the preprocessor 2 7 2 includes dummy data in the plaintext cut data as necessary.
- the method for generating the plaintext cut data from the processing target data is the same as described in S 1 1 0 2 of the first embodiment.
- the solution generation unit 2 74 generates a solution in response to the reception of information from the interface unit 2 71 that the interface unit 2 71 received the processing target data.
- the solution may be generated by the pre-processing unit 2 7 2 when the data to be processed is disconnected. In this case, the generation of data to be processed in the preprocessing unit 2 72 and the generation of the solution in the solution generation unit 27 4 are synchronized.
- the solution generation method in this embodiment is the same as that performed by the solution generator 2 74 when the first data processing device 11 of the first embodiment performs encryption.
- the generated solution is sent to the first algorithm generator 2 75 X, the second algorithm generator 2 75 5 Y, the first key generator 2 7 6 ⁇ , and the second key generator 2 7 6 ⁇ .
- the first algorithm generator 2 75 X and the first key generator 2 7 6 X that have accepted this generate an algorithm and a key, respectively.
- the algorithm and key generation method in this embodiment is performed by the algorithm generator 2 75 and the key generator 2 7 6 when the first data processing device 11 of the first embodiment generates an algorithm and a key. Is the same as
- the first algorithm generator 2 75 X and the first key generator 2 7 6 X send the generated algorithm and key to the encryption / decryption unit 2 73.
- the encryption / decryption unit 2 73 is based on the algorithm received from the first algorithm generation unit 2 75 X and the key received from the first key generation unit 2 7 6 X. 7
- the plain text cut data received from 2 is encrypted (S 1 5 0 3). This process The process is the same as the process of S 1 1 0 3 described in the first embodiment.
- the generated signal disconnection data is sent to the connection unit 2 7 7 where they are connected together and become encrypted data (S 1.5 0 4).
- the encrypted data generated as described above is recorded in the HD D 23 in the data processing device via the bus 29.
- Such encryption processing is performed a plurality of times in this embodiment.
- the decoding of the signal data recorded on the HD D 23 is performed.
- Decryption is started when the encryption device 27 reads the signature data recorded in the HD D 23 (S 1 600 1).
- Pre-processing unit 2 7 2 in encryption device 2 7 When receiving encrypted data from HD D 2 3 via interface unit 2 7 1, pre-processing unit 2 7 2 receives the encrypted data as specified.
- the encrypted cut data is generated by cutting every number of bits (S 1 6 0 2).
- the preprocessing unit 2 72 performs a process reverse to that performed in the above-described encryption process. In other words, the encrypted data is cut every 8 bits from the beginning and divided into a plurality of encrypted cut data. This process is the same as the process of S 1 2 0 3 in the first embodiment.
- the sign-sign cut data is sent to the encryption / decryption section 2 73, where it is decrypted and converted into plaintext cut data (S 1 600 3).
- Decryption is performed as a process opposite to the above-described encryption process performed by the encryption / decryption unit 2 73.
- the encryption / decryption unit 2 7 3 needs the algorithm and key used for encryption.
- the second algorithm generator 2 75 Y uses the previously generated solution, the second algorithm generator 2 75 Y generates an algorithm, and the second key generator 2 7 6 Y generates a key. Since the order in which the encrypted data is decrypted matches the order in which the encrypted data is signed from the processing target data, the second algorithm generator 2 7 5 Y and the first The algorithm and key generated by the two-key generator 2 7 6 Y are generated based on the solution used when the signature data to be decrypted is encrypted. This is generated by the second algorithm generator 2 7 5 Y Means that the key generated by the second key generator 2 7 6 Y matches the algorithm and key used when the encrypted data to be decrypted is encrypted. .
- the decryption unit 2 7 3 may generate the algorithm and key at any timing until the algorithm and key are required.
- the algorithm generated by the second algorithm generation unit 2 7 5 ⁇ and the key generated by the second key generation unit 2 7 6 ⁇ are sent to the ⁇ sign / decoding unit 2 7 3.
- the decryption unit 2 7 3 uses the algorithm and key to sequentially decrypt the encrypted data and convert it into plaintext data. This process is executed as a process similar to the process described in S 1 2 0 4 of the first embodiment.
- the encryption / decryption section 2 73 removes the dummy data from the plaintext cut data as necessary (S 1 6 0 4). This process is executed as the same process as the process of S 1 2 0 5 in the first embodiment.
- the plain text cut data generated in this way is sent to the connection unit 2 7 7.
- the connection unit 2 7 7 connects the received plain text cut data together to generate processing target data (S 1 600 5).
- the generated processing target data is sent from the connection unit 2 7 7 to the interface unit 2 71 and recorded in the HD D 2 3 via the bus 29.
- the data processing device in the second embodiment can be modified as follows.
- the data processing device in this modification is slightly different from the data processing device in the second embodiment in the configuration of the encryption device 27.
- Other parts are the same as those of the data processing apparatus in the second embodiment described above.
- the encryption device 27 of the data processing device in the modified example is configured as shown in FIG.
- the encryption device 27 includes a first solution generator 2 7 4 X, a second solution generator 2 7 4 Y, and two solution generators. Unlike the encryption device 2 7 of the data processing device in the second embodiment, Yes.
- Both the first solution generation unit 2 74 X and the second solution generation unit 2 7 4 Y generate a solution in the same manner as the solution generation unit 2 7 4 in the second embodiment.
- the first solution generation unit 2 74 4 X generates a solution in response to receiving information from the interface unit 2 71 1 that the interface unit 2 71 has received the processing target data. However, the first solution generator 2 7 4 X may generate a solution each time the data to be processed is disconnected in the preprocessor 2 7 2.
- the solution generated by the first solution generator 2 74 X is sent to the first algorithm generator 2 75 X and the first key generator 2 7 6 X.
- the first algorithm generator 2 7 5 X and the first key generator 2 7 6 X that have received this generate an algorithm and a key in the same manner as in the second embodiment.
- Send to decryption unit 2 7 3. ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ 2 7 3 is the first algorithm generator 2 75 X and the first key generator 2 7 6 X using the algorithm and key received from the encryption process Do.
- the second solution generation unit 2 74 4 Y generates a solution in response to receiving from the interface unit 2 71 1 information that the interface unit 2 71 has received the encrypted data.
- the second solution generator 2 7 4 Y may generate a solution each time the encrypted data is disconnected in the preprocessor 2 7 2.
- the solution generated by the second solution generator 2 7 4 Y is sent to the second algorithm generator 2 75 5 Y and the second key generator 2 7 6 Y.
- the second algorithm generation unit 2 75 Y and the second key generation unit 2 7 6 Y that have received this generate an algorithm and a key in the same manner as in the second embodiment, 'Send to decryption unit 2 7 3.
- ⁇ ⁇ ⁇ ⁇ Decoding unit 2 7 3 performs decryption process using algorithm and key received from 2nd algorithm generator 2 7 5 Y and 2nd key generator 2 7 6 Y .
- the solutions generated by the second solution generator 2 7 4 Y are the same as the solutions generated by the first solution generator 2 7 4 X if they are generated in the same order. Being les. This is because the solution generator 2 7 1 in the encryption device 2 7 built in the first data processing device 11 in the first embodiment and the encryption device built in the second data processing device 12 This is the same as the solution generator 2 7 1 A in 2 7 A generates the same solution when comparing the generated components in the same order. In other words, this strange
- the second solution generator 2 7 4 Y and the first solution generator 2 7 4 X in the example have the same solution generation algorithm and the same initial matrix.
- the data processing device in this modification performs the same processing as the data processing device of the second embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
Description
Claims
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006800074969A CN101138194B (en) | 2005-03-08 | 2006-03-07 | Data processing apparatus |
US11/817,304 US8577022B2 (en) | 2005-03-08 | 2006-03-07 | Data processing apparatus |
BRPI0608040A BRPI0608040A2 (en) | 2005-03-08 | 2006-03-07 | data processing device, data processing system and data processing method performed on a data processing device |
CA002599878A CA2599878A1 (en) | 2005-03-08 | 2006-03-07 | Data processing apparatus |
EP06728952.0A EP1865653B1 (en) | 2005-03-08 | 2006-03-07 | Data processing apparatus |
AU2006221275A AU2006221275A1 (en) | 2005-03-08 | 2006-03-07 | Data processing apparatus |
IL185572A IL185572A0 (en) | 2005-03-08 | 2007-08-28 | Data processing apparatus |
HK08101462.9A HK1107883A1 (en) | 2005-03-08 | 2008-02-06 | Data processing apparatus |
AU2010212527A AU2010212527A1 (en) | 2005-03-08 | 2010-08-24 | Data processing apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005063270A JP2006253745A (en) | 2005-03-08 | 2005-03-08 | Data processing apparatus, system, and method |
JP2005-063270 | 2005-03-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006095895A1 true WO2006095895A1 (en) | 2006-09-14 |
Family
ID=36953479
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2006/304836 WO2006095895A1 (en) | 2005-03-08 | 2006-03-07 | Data processing apparatus |
Country Status (13)
Country | Link |
---|---|
US (1) | US8577022B2 (en) |
EP (1) | EP1865653B1 (en) |
JP (1) | JP2006253745A (en) |
KR (2) | KR101008135B1 (en) |
CN (1) | CN101138194B (en) |
AU (2) | AU2006221275A1 (en) |
BR (1) | BRPI0608040A2 (en) |
CA (1) | CA2599878A1 (en) |
HK (1) | HK1107883A1 (en) |
IL (1) | IL185572A0 (en) |
RU (1) | RU2007136968A (en) |
TW (1) | TW200704095A (en) |
WO (1) | WO2006095895A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112232639A (en) * | 2020-09-22 | 2021-01-15 | 支付宝(杭州)信息技术有限公司 | Statistical method and device and electronic equipment |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2787789C (en) * | 1999-01-20 | 2014-09-30 | Certicom Corp. | A resilient cryptograhic scheme |
MX2007008184A (en) * | 2005-01-07 | 2007-10-02 | Ncrypt Inc | Communication system and communication method. |
JP4860708B2 (en) * | 2006-12-27 | 2012-01-25 | 富士通株式会社 | Stream cipher method and cipher system |
JP2008165613A (en) | 2006-12-28 | 2008-07-17 | N-Crypt Lab Inc | Authentication system, authentication device, authentication method, user device, and data processing method |
JP2008165612A (en) | 2006-12-28 | 2008-07-17 | N-Crypt Lab Inc | Authentication system, device, and method, user device, and data processing method |
JP2009253650A (en) | 2008-04-04 | 2009-10-29 | N-Crypt Lab Inc | Transmission and reception system, transmission device, reception device, authentication device, user device, method executed by those, and program |
JP5395372B2 (en) * | 2008-06-19 | 2014-01-22 | 株式会社東芝 | Communication device, key server and data |
JP5326815B2 (en) * | 2009-05-26 | 2013-10-30 | 富士通株式会社 | Packet transmitting / receiving apparatus and packet transmitting / receiving method |
US9008313B1 (en) * | 2014-07-24 | 2015-04-14 | Elliptic Technologies Inc. | System and method for generating random key stream cipher texts |
CN106301763B (en) * | 2016-08-31 | 2019-07-16 | 国家超级计算深圳中心(深圳云计算中心) | A kind of data encryption based on double salt figure and decryption method and system |
JP7321481B2 (en) * | 2017-07-03 | 2023-08-07 | 株式会社 エヌティーアイ | First communication device, second communication device, method, computer program |
JP7005000B2 (en) * | 2017-08-07 | 2022-01-21 | 株式会社 エヌティーアイ | Virtual currency data issuing system, user terminal, management device, method, and computer program |
JP2021012339A (en) * | 2019-07-09 | 2021-02-04 | 株式会社 エヌティーアイ | Data processing device, data processing method, and computer program |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06216897A (en) * | 1993-01-20 | 1994-08-05 | Nippon Signal Co Ltd:The | Data transmitter-receiver |
JPH0728407A (en) * | 1993-07-14 | 1995-01-31 | Nec Corp | Ciphering preprocessor and deciphering postprocessor by cipher |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5008938A (en) * | 1990-03-09 | 1991-04-16 | Motorola, Inc. | Encryption apparatus |
JPH0488736A (en) * | 1990-07-31 | 1992-03-23 | Matsushita Electric Ind Co Ltd | Data transmission system |
JPH0918469A (en) * | 1995-06-30 | 1997-01-17 | Canon Inc | Equipment and system for cipher communication and ciphering device |
JP3086887B2 (en) * | 1996-08-08 | 2000-09-11 | 株式会社ローレルインテリジェントシステムズ | Information transmission method, information transmission method, information reproduction method, and communication device |
JPH1155241A (en) * | 1997-07-30 | 1999-02-26 | Sharp Corp | Communication equipment with enciphered key system |
JPH1196674A (en) * | 1997-09-22 | 1999-04-09 | Digital Vision Laboratories:Kk | Data recording device data reproducing device, and data recording medium |
US6259789B1 (en) * | 1997-12-12 | 2001-07-10 | Safecourier Software, Inc. | Computer implemented secret object key block cipher encryption and digital signature device and method |
JP3561154B2 (en) * | 1997-12-26 | 2004-09-02 | 株式会社東芝 | Broadcast receiving device and contract management device |
US6490353B1 (en) * | 1998-11-23 | 2002-12-03 | Tan Daniel Tiong Hok | Data encrypting and decrypting apparatus and method |
JP3891720B2 (en) * | 1999-02-22 | 2007-03-14 | コロムビアミュージックエンタテインメント株式会社 | Recording medium and recording / reproducing apparatus |
US20010033654A1 (en) * | 2000-01-13 | 2001-10-25 | Gabor Wieser | W-EC1 encryption and decryption method and system |
JP2001211442A (en) * | 2000-01-27 | 2001-08-03 | Victor Co Of Japan Ltd | Contents information transmission method, contents information recording method, contents information transmitter, contents information recorder, transmission medium, and recording medium |
CN1347225A (en) * | 2000-10-09 | 2002-05-01 | 杨高雄 | Safety control method for copyright |
JP3770584B2 (en) * | 2000-10-31 | 2006-04-26 | シャープ株式会社 | Encryption key generation circuit |
WO2002051126A2 (en) * | 2000-12-21 | 2002-06-27 | Eastman Kodak Company | Method and system for trusted digital camera |
US7155011B2 (en) * | 2001-03-13 | 2006-12-26 | Victor Company Of Japan, Limited | Encryption method, decryption method, and recording and reproducing apparatus |
CN1200560C (en) * | 2001-04-20 | 2005-05-04 | 安科数码媒体有限公司 | Device and method for processing digital audio-video medium |
US7382878B2 (en) * | 2001-06-22 | 2008-06-03 | Uponus Technologies, Llc | System and method for data encryption |
JP3851115B2 (en) * | 2001-06-28 | 2006-11-29 | 富士通株式会社 | Cryptographic circuit |
JP2003115830A (en) * | 2001-10-03 | 2003-04-18 | Victor Co Of Japan Ltd | Information recording device and information recording and reproducing device |
JP2003152706A (en) * | 2001-11-12 | 2003-05-23 | Toshiba Information Systems (Japan) Corp | Encryption generating device, encryption decrypting device, encryption generating program, encryption decrypting program, authentication system, and electronic device |
US7380120B1 (en) * | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
GB0129928D0 (en) * | 2001-12-14 | 2002-02-06 | Ibm | Method and apparatus for encryption of data |
EP1471486A3 (en) * | 2003-01-31 | 2006-02-08 | Khalil Jiraki | Time based encryption algorithm |
JP2004265194A (en) * | 2003-03-03 | 2004-09-24 | Matsushita Electric Ind Co Ltd | Information processing apparatus and information processing method |
US7346160B2 (en) * | 2003-04-23 | 2008-03-18 | Michaelsen David L | Randomization-based encryption apparatus and method |
DE102004018874B4 (en) * | 2004-04-19 | 2009-08-06 | Infineon Technologies Ag | Method and device for determining a result |
-
2005
- 2005-03-08 JP JP2005063270A patent/JP2006253745A/en active Pending
-
2006
- 2006-03-07 TW TW095107536A patent/TW200704095A/en unknown
- 2006-03-07 KR KR1020077022782A patent/KR101008135B1/en active IP Right Grant
- 2006-03-07 US US11/817,304 patent/US8577022B2/en active Active
- 2006-03-07 WO PCT/JP2006/304836 patent/WO2006095895A1/en active Application Filing
- 2006-03-07 RU RU2007136968/09A patent/RU2007136968A/en not_active Application Discontinuation
- 2006-03-07 BR BRPI0608040A patent/BRPI0608040A2/en not_active IP Right Cessation
- 2006-03-07 AU AU2006221275A patent/AU2006221275A1/en not_active Abandoned
- 2006-03-07 KR KR1020107026306A patent/KR20100128355A/en active IP Right Grant
- 2006-03-07 CA CA002599878A patent/CA2599878A1/en not_active Abandoned
- 2006-03-07 CN CN2006800074969A patent/CN101138194B/en active Active
- 2006-03-07 EP EP06728952.0A patent/EP1865653B1/en active Active
-
2007
- 2007-08-28 IL IL185572A patent/IL185572A0/en unknown
-
2008
- 2008-02-06 HK HK08101462.9A patent/HK1107883A1/en unknown
-
2010
- 2010-08-24 AU AU2010212527A patent/AU2010212527A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06216897A (en) * | 1993-01-20 | 1994-08-05 | Nippon Signal Co Ltd:The | Data transmitter-receiver |
JPH0728407A (en) * | 1993-07-14 | 1995-01-31 | Nec Corp | Ciphering preprocessor and deciphering postprocessor by cipher |
Non-Patent Citations (1)
Title |
---|
See also references of EP1865653A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112232639A (en) * | 2020-09-22 | 2021-01-15 | 支付宝(杭州)信息技术有限公司 | Statistical method and device and electronic equipment |
CN112232639B (en) * | 2020-09-22 | 2023-06-30 | 支付宝(杭州)信息技术有限公司 | Statistical method, statistical device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
KR20070110417A (en) | 2007-11-16 |
RU2007136968A (en) | 2009-04-20 |
CN101138194A (en) | 2008-03-05 |
AU2006221275A1 (en) | 2006-09-14 |
CA2599878A1 (en) | 2006-09-14 |
KR20100128355A (en) | 2010-12-07 |
EP1865653B1 (en) | 2015-07-22 |
EP1865653A4 (en) | 2011-11-02 |
AU2010212527A1 (en) | 2010-09-16 |
US20090141889A1 (en) | 2009-06-04 |
EP1865653A1 (en) | 2007-12-12 |
BRPI0608040A2 (en) | 2017-05-23 |
CN101138194B (en) | 2011-10-05 |
KR101008135B1 (en) | 2011-01-13 |
HK1107883A1 (en) | 2008-04-18 |
IL185572A0 (en) | 2008-01-06 |
TW200704095A (en) | 2007-01-16 |
US8577022B2 (en) | 2013-11-05 |
JP2006253745A (en) | 2006-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006095895A1 (en) | Data processing apparatus | |
JP3086887B2 (en) | Information transmission method, information transmission method, information reproduction method, and communication device | |
US8401186B2 (en) | Cloud storage data access method, apparatus and system based on OTP | |
US6445794B1 (en) | System and method for synchronizing one time pad encryption keys for secure communication and access control | |
EP0840477B1 (en) | Secret key transfer method which is highly secure and can restrict the damage caused when the secret key is leaked or decoded | |
WO2006095891A1 (en) | Data processing apparatus | |
WO2007001075A1 (en) | Encryption device, encryption method, decryption device, decryption method, and data structure | |
JPH1075240A (en) | Method for protecting data transmission and device for ciphering or deciphering data | |
WO2006073201A1 (en) | Communication system and communication method | |
CN109829322B (en) | Authorization information based real-time encryption and decryption method and system for digital media files | |
WO2006073200A1 (en) | Communication system and communication method | |
EP1459474B1 (en) | Anti-pirate method for the distribution of digital content | |
JP5837625B2 (en) | Communication system and communication method | |
JP5837626B2 (en) | Data processing apparatus, data processing system, and data processing method | |
JP4302076B2 (en) | Key judgment device | |
JP3526523B2 (en) | Secret key transmission method | |
TW202403576A (en) | Cipher device and cipher method thereof | |
JP2011234398A (en) | Data processing device, data processing system, and data processing method | |
JP2011229174A (en) | Data processing device, data processing system and data processing method | |
CN118070306A (en) | Hidden data transmission method and device, electronic equipment and storage medium | |
CN114491574A (en) | Data encryption method and device | |
JP2017118560A (en) | Data processing device, data processing system, and data processing method | |
JP2011259446A (en) | Communication system and communication method | |
JP2014099875A (en) | Communication system and communication method | |
JP2014079002A (en) | Data processing device, data processing system and data processing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200680007496.9 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006221275 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 185572 Country of ref document: IL |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2599878 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/a/2007/010706 Country of ref document: MX |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006728952 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2006221275 Country of ref document: AU Date of ref document: 20060307 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2006221275 Country of ref document: AU |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 3993/CHENP/2007 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020077022782 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007136968 Country of ref document: RU |
|
WWP | Wipo information: published in national office |
Ref document number: 2006728952 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11817304 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020107026306 Country of ref document: KR |
|
ENP | Entry into the national phase |
Ref document number: PI0608040 Country of ref document: BR Kind code of ref document: A2 Effective date: 20070910 |